
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in UPX 3.96 (CVE-2021-20285) involving an illegal memory access in the canPack function within plxelf.cpp. The flaw allows attackers to cause a denial of service (SEGV or buffer overflow leading to application crash) or potentially have other unspecified impacts through a crafted ELF file (Bugzilla Report).
The vulnerability occurs in the canPack function at plxelf.cpp:2571 (development branch) and plxelf.cpp:2490 (release version). The issue stems from insufficient validation of the reloff value before accessing memory, leading to illegal memory access. The problematic code retrieves values using gette64() without proper bounds checking, which can result in a buffer overflow condition (GitHub Issue).
The vulnerability can lead to denial of service through application crashes caused by segmentation faults or buffer overflows. When exploited using a specially crafted ELF file, the flaw could potentially have additional unspecified security impacts (Bugzilla Report).
The issue has been fixed in versions after UPX 3.96. The recommended mitigation is to update to a patched version of UPX. The fix involves implementing proper validation of the relocation_offset before accessing memory (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."