CVE-2020-27787

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-27787
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-27787.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-27787
Downstream
Published
2022-08-18T19:15:14Z
Modified
2025-09-19T12:14:52.053336Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A Segmentaation fault was found in UPX in invertptdynamic() function in plxelf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.

References

Affected packages

Git / github.com/upx/upx

Affected ranges

Type
GIT
Repo
https://github.com/upx/upx
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*

v1.10
v1.11
v1.90
v1.91
v1.92
v1.93
v1.94
v1.95
v1.96

v2.*

v2.00
v2.01
v2.90
v2.91
v2.92
v2.93

v3.*

v3.00
v3.01
v3.02
v3.03
v3.04
v3.05
v3.06
v3.07
v3.08
v3.09
v3.91
v3.92
v3.93
v3.94
v3.95

Database specific

{
    "vanir_signatures": [
        {
            "digest": {
                "function_hash": "144188400907574595322118236151414717433",
                "length": 4697.0
            },
            "id": "CVE-2020-27787-4f82974f",
            "source": "https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d",
            "signature_version": "v1",
            "signature_type": "Function",
            "target": {
                "file": "src/p_lx_elf.cpp",
                "function": "PackLinuxElf32::invert_pt_dynamic"
            },
            "deprecated": false
        },
        {
            "digest": {
                "function_hash": "340111673276646739986786030959432866294",
                "length": 4912.0
            },
            "id": "CVE-2020-27787-af096cd6",
            "source": "https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d",
            "signature_version": "v1",
            "signature_type": "Function",
            "target": {
                "file": "src/p_lx_elf.cpp",
                "function": "PackLinuxElf64::invert_pt_dynamic"
            },
            "deprecated": false
        },
        {
            "digest": {
                "threshold": 0.9,
                "line_hashes": [
                    "257870881940862614609256973709132984056",
                    "272158922209213423681413894420799670836",
                    "176268528693580875637945846304155638766",
                    "4221361576905600357362673166681574292",
                    "154229085320354130783943885107519624097",
                    "11798162522091701296182368638276175336",
                    "282848170757409618206783482560684873570",
                    "31926769796970019876012897729278008859",
                    "244734299183139268848497553753801842845",
                    "258066308543225000455264772561468355391",
                    "257870881940862614609256973709132984056",
                    "272158922209213423681413894420799670836",
                    "176268528693580875637945846304155638766",
                    "4221361576905600357362673166681574292",
                    "154229085320354130783943885107519624097",
                    "266942197280038991510482381445817127018",
                    "207549958718149381218130491740951084509",
                    "95523670887827168245398882281645789644",
                    "85300983397851604295314245906508970075",
                    "299798673324378474265789794499724747146"
                ]
            },
            "id": "CVE-2020-27787-bedbb14e",
            "source": "https://github.com/upx/upx/commit/e2f60adc95334f47e286838dac33160819c5d74d",
            "signature_version": "v1",
            "signature_type": "Line",
            "target": {
                "file": "src/p_lx_elf.cpp"
            },
            "deprecated": false
        }
    ]
}