
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability was discovered in PSPP version 1.6.2. The vulnerability exists in the read_string function within the utilities/pspp-dump-sav.c file. The issue was discovered and reported on September 2, 2022 (Savannah Bug).
The vulnerability is a heap-based buffer overflow that occurs in the readstring function, specifically when handling character encoding in the pspp-dump-sav utility. The issue manifests during the readcharacterencoding process, which is called by readextension_record. The vulnerability can be triggered through the pspp-dump-sav utility when processing specially crafted input files (Savannah Bug).
When exploited, this vulnerability could lead to a heap buffer overflow condition, potentially allowing an attacker to cause program crashes or execute arbitrary code. The vulnerability affects the data processing capabilities of PSPP, particularly when handling SAV file formats (NVD).
The issue has been fixed in versions after PSPP 1.6.2. The fix prevents the vulnerable program from being installed, as documented in the Git commit: https://git.savannah.gnu.org/cgit/pspp.git/commit/?id=8596d6eb21e40ffaf9321d1cb779333de3126b50 (Savannah Bug).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."