First published: Fri Mar 24 2023(Updated: )
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688.
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
UPX | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap-based buffer overflow is CVE-2021-43313.
The affected software is Upx Project Upx version up to 4.0.0.
This vulnerability has a severity rating of 7.5 (high).
The CWE ID for this vulnerability is CWE-119, CWE-787.
Yes, you can find the reference for this vulnerability at https://github.com/upx/upx/issues/378.