UPX 4.2.0

CPE Details

UPX 4.2.0
4.2.0
2025-04-11
17h21 +00:00
2025-04-11
17h21 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:upx:upx:4.2.0:*:*:*:*:*:*:*

Informations

Vendor

upx

Product

upx

Version

4.2.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2025-2849 2025-03-27 13h31 +00:00 A vulnerability, which was classified as problematic, was found in UPX up to 5.0.0. Affected is the function PackLinuxElf64::un_DT_INIT of the file src/p_lx_elf.cpp. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The patch is identified as e0b6ff192412f5bb5364c1948f4f6b27a0cd5ea2. It is recommended to apply a patch to fix this issue.
4.8
Medium
CVE-2024-3209 2024-04-02 23h00 +00:00 A vulnerability was found in UPX up to 4.2.2. It has been rated as critical. This issue affects the function get_ne64 of the file bele.h. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259055. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
9.8
Critical
CVE-2023-23457 2023-01-12 00h00 +00:00 A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
5.5
Medium
CVE-2023-23456 2023-01-11 23h00 +00:00 A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file.
5.5
Medium