
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap-based buffer overflow vulnerability was discovered in UPX (CVE-2021-43312), affecting versions prior to 4.0.0. The vulnerability exists in the PackLinuxElf64::invert_pt_dynamic function at p_lx_elf.cpp:5239, where the variable 'bucket' points to an inaccessible address (GitHub Issue, NVD).
The vulnerability is triggered in the PackLinuxElf64::invert_pt_dynamic function when processing ELF files. The issue occurs due to improper boundary checking for the loop variable 'j' when accessing the 'buckets' array. The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The weakness is classified as CWE-787 (Out-of-bounds Write) (NVD).
When exploited, this vulnerability can lead to a heap-based buffer overflow, potentially causing application crashes and denial of service conditions. The vulnerability affects the program's ability to process ELF files securely (GitHub Issue).
The vulnerability has been fixed in UPX version 4.0.0. Users are advised to upgrade to this version or later. The fix involves implementing proper boundary checks for the loop variable 'j' to ensure it doesn't exceed the allocated size of the 'buckets' array (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."