Permalink
CVE-2023-23456
5.3 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): LOW
by @LeSuisse Activity log
- Created automatic suggestion
- @LeSuisse dismissed
Upx: heap-buffer-overflow in packtmt::pack()
A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file.
References
-
FEDORA-2023-8d91390935 vendor-advisory
-
FEDORA-2023-89fdc22ace vendor-advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2160381 x_transferred
-
https://github.com/upx/upx/issues/632 x_transferred
-
-
-
FEDORA-2023-8d91390935 vendor-advisory
-
FEDORA-2023-89fdc22ace vendor-advisory
-
FEDORA-2023-8d91390935 vendor-advisory
-
FEDORA-2023-89fdc22ace vendor-advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2160381 x_transferred
-
https://github.com/upx/upx/issues/632 x_transferred
-
-
-
FEDORA-2023-8d91390935 vendor-advisory
-
FEDORA-2023-89fdc22ace vendor-advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2160381 x_transferred
-
https://github.com/upx/upx/issues/632 x_transferred
-
-
-
FEDORA-2023-8d91390935 vendor-advisory
-
FEDORA-2023-89fdc22ace vendor-advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=2160381 x_transferred
-
https://github.com/upx/upx/issues/632 x_transferred
-
-
Affected products
upx
- *