Vulnerability Details : CVE-2023-23457
Potential exploit
A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
Vulnerability category: OverflowMemory CorruptionDenial of service
Products affected by CVE-2023-23457
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
- cpe:2.3:a:upx_project:upx:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-23457
0.11%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 45 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-23457
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST | |
5.3
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L |
1.8
|
3.4
|
Fedora Project | 2024-04-19 |
CWE ids for CVE-2023-23457
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by:
- nvd@nist.gov (Primary)
- patrick@puiterwijk.org (Secondary)
References for CVE-2023-23457
-
https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860
invert_pt_dynamic: fix thinko; PackLinuxElf64help1 insist on ELF · upx/upx@779b648 · GitHubPatch;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/
[SECURITY] Fedora 36 Update: upx-4.0.1-2.fc36 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/
[SECURITY] Fedora 37 Update: upx-4.0.1-2.fc37 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EL3BVKIGG3SH6I3KPOYQAWCBD4UMPOPI/
[SECURITY] Fedora 36 Update: upx-4.0.1-2.fc36 - package-announce - Fedora Mailing-Lists
-
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TGEP3FBNRZXGLIA2B2ICMB32JVMPREFZ/
[SECURITY] Fedora 37 Update: upx-4.0.1-2.fc37 - package-announce - Fedora Mailing-Lists
-
https://bugzilla.redhat.com/show_bug.cgi?id=2160382
2160382 – (CVE-2023-23457) CVE-2023-23457 upx: SEGV on PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cppIssue Tracking;Patch;Third Party Advisory
-
https://github.com/upx/upx/issues/631
SEGV on PackLinuxElf64::invert_pt_dynamic · Issue #631 · upx/upx · GitHubExploit;Patch;Third Party Advisory
Jump to