Filtered by vendor Upx
Subscribe
Total
35 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2024-3209 | 2 Fedoraproject, Upx | 2 Fedora, Upx | 2025-04-25 | 5.2 MEDIUM | 5.5 MEDIUM |
A vulnerability was found in UPX up to 4.2.2. It has been rated as critical. This issue affects the function get_ne64 of the file bele.h. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259055. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | |||||
CVE-2017-15056 | 1 Upx | 1 Upx | 2025-04-20 | 6.8 MEDIUM | 7.8 HIGH |
p_lx_elf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack(). | |||||
CVE-2017-16869 | 1 Upx | 1 Upx | 2025-04-20 | 6.8 MEDIUM | 7.8 HIGH |
p_mach.cpp in UPX 3.94 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly have unspecified other impact via a crafted Mach-O file, related to canPack and unpack functions. NOTE: the vendor has stated "there is no security implication whatsoever. | |||||
CVE-2025-2849 | 1 Upx | 1 Upx | 2025-04-11 | 1.7 LOW | 3.3 LOW |
A vulnerability, which was classified as problematic, was found in UPX up to 5.0.0. Affected is the function PackLinuxElf64::un_DT_INIT of the file src/p_lx_elf.cpp. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The patch is identified as e0b6ff192412f5bb5364c1948f4f6b27a0cd5ea2. It is recommended to apply a patch to fix this issue. | |||||
CVE-2020-27790 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 5.5 MEDIUM |
A floating point exception issue was discovered in UPX in PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service. The highest impact is to Availability. | |||||
CVE-2020-27801 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 7.8 HIGH |
A heap-based buffer over-read was discovered in the get_le64 function in bele.h in UPX 4.0.0 via a crafted Mach-O file. | |||||
CVE-2021-46179 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 6.5 MEDIUM |
Reachable Assertion vulnerability in upx before 4.0.0 allows attackers to cause a denial of service via crafted file passed to the the readx function. | |||||
CVE-2021-43317 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 7.5 HIGH |
A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf64::elf_lookup() at p_lx_elf.cpp:5404 | |||||
CVE-2019-20805 | 1 Upx | 1 Upx | 2025-04-11 | 4.3 MEDIUM | 5.5 MEDIUM |
p_lx_elf.cpp in UPX before 3.96 has an integer overflow during unpacking via crafted values in a PT_DYNAMIC segment. | |||||
CVE-2020-27798 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 5.5 MEDIUM |
An invalid memory address reference was discovered in the adjABS function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file. | |||||
CVE-2021-43313 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 7.5 HIGH |
A heap-based buffer overflow was discovered in upx, during the variable 'bucket' points to an inaccessible address. The issue is being triggered in the function PackLinuxElf32::invert_pt_dynamic at p_lx_elf.cpp:1688. | |||||
CVE-2019-14296 | 1 Upx | 1 Upx | 2025-04-11 | 6.8 MEDIUM | 7.8 HIGH |
canUnpack in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (SEGV or buffer overflow, and application crash) or possibly have unspecified other impact via a crafted UPX packed file. | |||||
CVE-2020-24119 | 2 Fedoraproject, Upx | 2 Fedora, Upx | 2025-04-11 | 5.8 MEDIUM | 7.1 HIGH |
A heap buffer overflow read was discovered in upx 4.0.0, because the check in p_lx_elf.cpp is not perfect. | |||||
CVE-2020-27796 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 7.8 HIGH |
A heap-based buffer over-read was discovered in the invert_pt_dynamic function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file. | |||||
CVE-2019-20053 | 2 Opensuse, Upx | 3 Backports, Leap, Upx | 2025-04-11 | 4.3 MEDIUM | 5.5 MEDIUM |
An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. | |||||
CVE-2019-20021 | 2 Fedoraproject, Upx | 2 Fedora, Upx | 2025-04-11 | 4.3 MEDIUM | 5.5 MEDIUM |
A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file. | |||||
CVE-2021-43316 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 7.5 HIGH |
A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le64(). | |||||
CVE-2021-43311 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 7.5 HIGH |
A heap-based buffer overflow was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5382. | |||||
CVE-2020-27797 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 5.5 MEDIUM |
An invalid memory address reference was discovered in the elf_lookup function in p_lx_elf.cpp in UPX 4.0.0 via a crafted Mach-O file. | |||||
CVE-2021-43315 | 1 Upx | 1 Upx | 2025-04-11 | N/A | 7.5 HIGH |
A heap-based buffer overflows was discovered in upx, during the generic pointer 'p' points to an inaccessible address in func get_le32(). The problem is essentially caused in PackLinuxElf32::elf_lookup() at p_lx_elf.cpp:5349 |