First published: Fri Mar 24 2023(Updated: )
A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
UPX | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap-based buffer overflow in upx is CVE-2021-43311.
The affected software by this vulnerability is upx version up to 4.0.0.
The severity rating of CVE-2021-43311 is high (7.5).
The CWE ID associated with this vulnerability is CWE-119 and CWE-787.
Yes, for more information about this vulnerability, you can refer to the GitHub issue: https://github.com/upx/upx/issues/380