Vulnerability Details : CVE-2019-20805
p_lx_elf.cpp in UPX before 3.96 has an integer overflow during unpacking via crafted values in a PT_DYNAMIC segment.
Vulnerability category: Overflow
Products affected by CVE-2019-20805
- cpe:2.3:a:upx:upx:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2019-20805
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2019-20805
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:N/A:P |
8.6
|
2.9
|
NIST | |
5.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H |
1.8
|
3.6
|
NIST |
CWE ids for CVE-2019-20805
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2019-20805
-
https://github.com/upx/upx/issues/317
upx-devel ddos Vulnerability · Issue #317 · upx/upx · GitHubThird Party Advisory
-
https://github.com/upx/upx/commit/8be9da8280dfa69d5df4417d4d81bda1cab78010
Avoid bogus values in PT_DYNAMIC segment. · upx/upx@8be9da8 · GitHubPatch;Third Party Advisory
Jump to