CVE-2023-23457

Source
https://cve.org/CVERecord?id=CVE-2023-23457
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-23457.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-23457
Downstream
Related
Published
2023-01-12T19:15:24.810Z
Modified
2026-01-31T06:55:53.138950Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A Segmentation fault was found in UPX in PackLinuxElf64::invertptdynamic() in plxelf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.

References

Affected packages

Git / github.com/upx/upx

Affected ranges

Type
GIT
Repo
https://github.com/upx/upx
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.10
v1.11
v1.90
v1.91
v1.92
v1.93
v1.94
v1.95
v1.96
v2.*
v2.00
v2.01
v2.90
v2.91
v2.92
v2.93
v3.*
v3.00
v3.01
v3.02
v3.03
v3.04
v3.05
v3.06
v3.07
v3.08
v3.09
v3.91
v3.92
v3.93
v3.94
v3.95
v3.96
v3.99
v4.*
v4.0.0
v4.0.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-23457.json"
vanir_signatures
[
    {
        "digest": {
            "function_hash": "42262339947388032623676980633824805462",
            "length": 8788.0
        },
        "signature_version": "v1",
        "target": {
            "file": "src/p_lx_elf.cpp",
            "function": "PackLinuxElf64::invert_pt_dynamic"
        },
        "signature_type": "Function",
        "id": "CVE-2023-23457-b45d7355",
        "source": "https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860",
        "deprecated": false
    },
    {
        "digest": {
            "function_hash": "19408914365346423957561054170081573682",
            "length": 3026.0
        },
        "signature_version": "v1",
        "target": {
            "file": "src/p_lx_elf.cpp",
            "function": "PackLinuxElf32::PackLinuxElf32help1"
        },
        "signature_type": "Function",
        "id": "CVE-2023-23457-bbcab3cb",
        "source": "https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860",
        "deprecated": false
    },
    {
        "digest": {
            "line_hashes": [
                "142249375640790411858129775142198822814",
                "36492286630692778435501818076002683148",
                "287972816287874434871393969878197477036",
                "191566115527692203313297558251537077106",
                "46780460521686308984823082895463285932",
                "139229797549286814348365000422297446028",
                "286349361568889596936212651919805016948",
                "307332015826809553851266029188169250540",
                "225218205240047416029730917158781686809",
                "334738389901174910913574964795290529576",
                "139346916926389414586557055743959108249",
                "59598016787249905982194526332403768303"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "target": {
            "file": "src/p_lx_elf.cpp"
        },
        "signature_type": "Line",
        "id": "CVE-2023-23457-e59f550a",
        "source": "https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860",
        "deprecated": false
    },
    {
        "digest": {
            "function_hash": "210022612781763727422160080975331654848",
            "length": 3027.0
        },
        "signature_version": "v1",
        "target": {
            "file": "src/p_lx_elf.cpp",
            "function": "PackLinuxElf64::PackLinuxElf64help1"
        },
        "signature_type": "Function",
        "id": "CVE-2023-23457-ffaedcf9",
        "source": "https://github.com/upx/upx/commit/779b648c5f6aa9b33f4728f79dd4d0efec0bf860",
        "deprecated": false
    }
]