First published: Fri Mar 24 2023(Updated: )
A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404
Credit: patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
UPX | <4.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-43317.
The severity of CVE-2021-43317 is high, with a severity value of 7.5.
The software affected by CVE-2021-43317 is Upx Project Upx up to version 4.0.0.
The CWE ID associated with CVE-2021-43317 is CWE-119 and CWE-787.
Yes, you can find more information about CVE-2021-43317 at this reference: https://github.com/upx/upx/issues/380