CVE-2025-15564

3.3 LOW

📋 TL;DR

This vulnerability in Mapnik up to version 4.2.0 allows local attackers to trigger a divide-by-zero error in the mapnik::detail::mod operator. This could cause denial of service by crashing the application. Only users running Mapnik with local access are affected.

💻 Affected Systems

Products:
  • Mapnik
Versions: Up to and including 4.2.0
Operating Systems: All platforms running Mapnik
Default Config Vulnerable: ⚠️ Yes
Notes: Only exploitable by users with local access to the system running Mapnik.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Application crash leading to denial of service for Mapnik-dependent services, potentially disrupting map rendering workflows.

🟠

Likely Case

Local user causes Mapnik process to crash, requiring restart of affected services.

🟢

If Mitigated

Minimal impact with proper privilege separation and monitoring in place.

🌐 Internet-Facing: LOW - Attack requires local access, not remotely exploitable.
🏢 Internal Only: MEDIUM - Local users could disrupt Mapnik services, but requires existing local access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and knowledge of triggering the vulnerable function.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: Yes

Instructions:

No official patch available. Monitor Mapnik repository for updates. Consider upgrading to future versions when fix is released.

🔧 Temporary Workarounds

Restrict local access

all

Limit local user access to systems running Mapnik to trusted users only.

Implement process monitoring

all

Monitor Mapnik processes for crashes and implement automatic restart mechanisms.

🧯 If You Can't Patch

  • Implement strict access controls to limit local users who can interact with Mapnik processes
  • Deploy monitoring and alerting for Mapnik process crashes with automated recovery procedures

🔍 How to Verify

Check if Vulnerable:

Check Mapnik version: mapnik-config --version. If version is 4.2.0 or earlier, system is vulnerable.

Check Version:

mapnik-config --version

Verify Fix Applied:

When patch is available, verify version is greater than 4.2.0 using mapnik-config --version.

📡 Detection & Monitoring

Log Indicators:

  • Mapnik process crashes
  • Divide-by-zero errors in application logs
  • SIGFPE signals

Network Indicators:

  • None - local exploit only

SIEM Query:

Process:Name="mapnik" AND EventID="1000" OR ExceptionCode="0xc0000094"

🔗 References

📤 Share & Export