First published: Fri Mar 24 2023(Updated: )
A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5349
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
UPX | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this heap-based buffer overflow in upx is CVE-2021-43315.
The severity rating for CVE-2021-43315 is high with a value of 7.5.
The versions of upx up to and excluding 4.0.0 are affected by CVE-2021-43315.
The buffer overflow in upx is caused by a heap-based buffer overflow in the function get_le32() when the generic pointer 'p' points to an inaccessible address.
Yes, it is recommended to update upx to a version beyond 4.0.0 to mitigate the vulnerability.