First published: Thu Aug 25 2022(Updated: )
A heap-based buffer over-read was discovered in the get_le32 function in bele.h in UPX 4.0.0 via a crafted Mach-O file.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
UPX | =4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-27800 is high, with a severity value of 7.8.
CVE-2020-27800 affects UPX version 4.0.0.
CVE-2020-27800 has two CWE classifications: CWE-125 (Out-of-bounds Read) and CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer).
More information about CVE-2020-27800 can be found at the following link: [link](https://github.com/upx/upx/issues/395).
To fix the heap-based buffer over-read vulnerability in UPX 4.0.0, it is recommended to update UPX to a version that has addressed this vulnerability.