A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.
References
| Link | Resource |
|---|---|
| https://github.com/lief-project/LIEF/commit/81bd5d7ea0c390563f1c4c017c9019d154802978 | Patch |
| https://github.com/lief-project/LIEF/issues/1277 | Exploit Patch Issue Tracking |
| https://github.com/lief-project/LIEF/issues/1277#issuecomment-3693859001 | Exploit Patch Issue Tracking |
| https://github.com/lief-project/LIEF/releases/tag/0.17.2 | Release Notes |
| https://github.com/oneafter/1210/blob/main/segv1 | Product |
| https://vuldb.com/?ctiid.340375 | Permissions Required VDB Entry |
| https://vuldb.com/?id.340375 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.733329 | Third Party Advisory VDB Entry Exploit |
| https://github.com/lief-project/LIEF/issues/1277 | Exploit Patch Issue Tracking |
| https://github.com/lief-project/LIEF/issues/1277#issuecomment-3693859001 | Exploit Patch Issue Tracking |
| https://vuldb.com/?submit.733329 | Third Party Advisory VDB Entry Exploit |
Configurations
History
22 Jan 2026, 21:36
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Lief-project
Lief-project lief |
|
| CPE | cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:* | |
| References | () https://github.com/lief-project/LIEF/commit/81bd5d7ea0c390563f1c4c017c9019d154802978 - Patch | |
| References | () https://github.com/lief-project/LIEF/issues/1277 - Exploit, Patch, Issue Tracking | |
| References | () https://github.com/lief-project/LIEF/issues/1277#issuecomment-3693859001 - Exploit, Patch, Issue Tracking | |
| References | () https://github.com/lief-project/LIEF/releases/tag/0.17.2 - Release Notes | |
| References | () https://github.com/oneafter/1210/blob/main/segv1 - Product | |
| References | () https://vuldb.com/?ctiid.340375 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.340375 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.733329 - Third Party Advisory, VDB Entry, Exploit |
12 Jan 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/lief-project/LIEF/issues/1277 - | |
| References | () https://github.com/lief-project/LIEF/issues/1277#issuecomment-3693859001 - | |
| References | () https://vuldb.com/?submit.733329 - |
10 Jan 2026, 12:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-10 12:15
Updated : 2026-01-22 21:36
NVD link : CVE-2025-15504
Mitre link : CVE-2025-15504
CVE.ORG link : CVE-2025-15504
JSON object : View
Products Affected
lief-project
- lief
