First published: Mon Apr 12 2021(Updated: )
An assertion abort was found in upx MemBuffer::alloc() in mem.cpp, in version UPX 4.0.0. The flow allows attackers to cause a denial of service (abort) via a crafted file. Upstream issue: <a href="https://github.com/upx/upx/issues/486">https://github.com/upx/upx/issues/486</a> Upstream patch: <a href="https://github.com/upx/upx/pull/487">https://github.com/upx/upx/pull/487</a> <a href="https://github.com/upx/upx/commit/28e761cd42211dfe0124b7a29b2f74730f453e46">https://github.com/upx/upx/commit/28e761cd42211dfe0124b7a29b2f74730f453e46</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Upx Upx |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1948696 is classified as a denial of service vulnerability.
To fix REDHAT-BUG-1948696, you should apply the latest patch provided by the UPX maintainers.
REDHAT-BUG-1948696 affects UPX version 4.0.0.
Yes, REDHAT-BUG-1948696 can be exploited by attackers through crafted files.
The vulnerability in REDHAT-BUG-1948696 is triggered by an assertion abort in the MemBuffer::alloc() function.