UBUNTU-CVE-2017-15056

Source
https://ubuntu.com/security/CVE-2017-15056
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-15056.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2017-15056
Upstream
Published
2017-10-06T07:29:00Z
Modified
2025-10-24T04:46:32Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - low
Summary
[none]
Details

plxelf.cpp in UPX 3.94 mishandles ELF headers, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted binary file, as demonstrated by an Invalid Pointer Read in PackLinuxElf64::unpack().

References

Affected packages

Ubuntu:16.04:LTS / upx-ucl

Package

Name
upx-ucl
Purl
pkg:deb/ubuntu/upx-ucl@3.91-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.91-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.91-1",
            "binary_name": "upx-ucl"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-15056.json"