CVE-2025-2849

A vulnerability, which was classified as problematic, was found in UPX up to 5.0.0. Affected is the function PackLinuxElf64::un_DT_INIT of the file src/p_lx_elf.cpp. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The patch is identified as e0b6ff192412f5bb5364c1948f4f6b27a0cd5ea2. It is recommended to apply a patch to fix this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:upx:upx:*:*:*:*:*:*:*:*

History

11 Apr 2025, 16:09

Type Values Removed Values Added
CWE CWE-787
CPE cpe:2.3:a:upx:upx:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 3.3
v2 : unknown
v3 : 5.5
First Time Upx
Upx upx
References () https://github.com/upx/upx/issues/898#issuecomment-2734082143 - () https://github.com/upx/upx/issues/898#issuecomment-2734082143 - Exploit, Issue Tracking
References () https://vuldb.com/?ctiid.301494 - () https://vuldb.com/?ctiid.301494 - Permissions Required, VDB Entry
References () https://vuldb.com/?submit.522371 - () https://vuldb.com/?submit.522371 - Third Party Advisory, VDB Entry
References () https://github.com/user-attachments/files/19307868/input.zip - () https://github.com/user-attachments/files/19307868/input.zip - Product
References () https://vuldb.com/?id.301494 - () https://vuldb.com/?id.301494 - Third Party Advisory, VDB Entry
References () https://github.com/upx/upx/issues/898 - () https://github.com/upx/upx/issues/898 - Exploit, Issue Tracking
References () https://github.com/upx/upx/commit/e0b6ff192412f5bb5364c1948f4f6b27a0cd5ea2 - () https://github.com/upx/upx/commit/e0b6ff192412f5bb5364c1948f4f6b27a0cd5ea2 - Patch

27 Mar 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-03-27 14:15

Updated : 2025-04-11 16:09


NVD link : CVE-2025-2849

Mitre link : CVE-2025-2849


JSON object : View

Products Affected

upx

  • upx
CWE
CWE-787

Out-of-bounds Write

CWE-122

Heap-based Buffer Overflow

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer