MEDIUM Severity

CVE-2025-47815

Heap-based buffer overflow in libpspp-core.a in GNU PSPP through 2.0.1

Overview

The vulnerability in GNU PSPP 2.0.1's libpspp-core.a can cause a heap-based buffer overflow. An attacker can use this vulnerability to affect system integrity and availability, although the attack complexity is high.

Technical Details

The problem lies in the inflate_read invoked indirectly from zip_member_read_all in zip-reader.c. It allows for buffer overflow, causing potential disruption and mal-effects in the system.

CVSS Metrics

  • Base Score: 4.5 (Medium Severity)
  • Attack Vector: Local
  • Attack Complexity: High
  • Privileges Required: None
  • User Interaction: None
  • Impact Score: 2.7
  • Confidentiality Impact: None
  • Integrity Impact: Low
  • Availability Impact: Low

Impact

Being a locally exploitable vulnerability, the direct impact on confidentiality is none, but it may lead to a low degree of impact on system integrity and availability.

Recommendations

  • Regularly update GNU PSPP to the latest version.
  • Routinely check system logs for any unusual activity.

Threat Metrics

  • "cvss_score": 4.5
  • "severity": "MEDIUM"
  • "attack_vector": "LOCAL"
  • "attack_complexity": "HIGH"