CVE-2025-60751

7.5 HIGH

📋 TL;DR

CVE-2025-60751 is a stack-based buffer overflow vulnerability in GeographicLib's GeoConvert DMS::InternalDecode function. Attackers can exploit this by providing specially crafted DMS (degrees-minutes-seconds) coordinate strings, potentially leading to arbitrary code execution. This affects any application using GeographicLib 2.5 for geographic coordinate conversions.

💻 Affected Systems

Products:
  • GeographicLib
Versions: Version 2.5 specifically
Operating Systems: All platforms where GeographicLib is used (Linux, Windows, macOS, etc.)
Default Config Vulnerable: ⚠️ Yes
Notes: Any application linking against GeographicLib 2.5 and using the GeoConvert functionality with DMS coordinate parsing is vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the application using GeographicLib, potentially leading to complete system compromise.

🟠

Likely Case

Application crash (denial of service) or limited memory corruption leading to unstable behavior.

🟢

If Mitigated

Application crash with no code execution if modern security protections (ASLR, stack canaries) are effective.

🌐 Internet-Facing: MEDIUM - Exploitable if application accepts untrusted coordinate input via network interfaces, but requires specific geographic data processing functionality.
🏢 Internal Only: LOW - Typically requires user interaction or specific geographic data processing workflows.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Proof-of-concept code is publicly available on GitHub. Exploitation requires understanding of DMS coordinate format and buffer overflow techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: GeographicLib 2.6 or later

Vendor Advisory: https://github.com/geographiclib/geographiclib/issues/43

Restart Required: Yes

Instructions:

1. Download GeographicLib 2.6 or later from the official repository. 2. Replace the vulnerable library files. 3. Recompile any applications using GeographicLib. 4. Restart affected services.

🔧 Temporary Workarounds

Input Validation for DMS Coordinates

all

Implement strict validation and sanitization of DMS coordinate strings before passing to GeographicLib functions.

Disable DMS Parsing

all

If possible, disable DMS coordinate parsing functionality and use alternative coordinate formats.

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems using GeographicLib from untrusted networks.
  • Deploy application-level firewalls or WAF rules to filter suspicious DMS coordinate patterns.

🔍 How to Verify

Check if Vulnerable:

Check if GeographicLib version 2.5 is installed using package manager or by checking library version.

Check Version:

geoconvert --version 2>/dev/null || dpkg -l | grep geographiclib || rpm -qa | grep geographiclib

Verify Fix Applied:

Verify GeographicLib version is 2.6 or later and test DMS coordinate parsing functionality.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with segmentation faults
  • Unusual memory access patterns in GeographicLib processes

Network Indicators:

  • Unusual DMS coordinate strings in network traffic to geographic services

SIEM Query:

process:geoconvert AND (event_id:1000 OR signal:SIGSEGV)

🔗 References

📤 Share & Export