
Cloud Vulnerability DB
A community-led vulnerabilities database
A heap buffer overflow vulnerability was discovered in LIEF v0.12.1, specifically in the LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind function. The vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted MachO file. This issue was reported on September 11, 2022 (LIEF Issue).
The vulnerability exists in the parse_dyldinfo_generic_bind function at MachO/BinaryParser.tcc:1629. When processing a malformed MachO file, the function performs an out-of-bounds read operation, leading to a heap buffer overflow. The issue was confirmed using Address Sanitizer (ASAN) which detected a READ overflow of size 8 at a heap-allocated memory region (LIEF Issue).
The vulnerability can be exploited to cause a Denial of Service (DoS) condition by processing a specially crafted MachO file. When triggered, the application crashes due to the heap buffer overflow, potentially disrupting services that rely on LIEF for MachO file parsing (NVD).
Users should upgrade to a version of LIEF newer than v0.12.1 that contains the fix for this vulnerability. No specific workarounds have been documented for users who cannot upgrade (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."