Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-23456

A heap-based buffer overflow issue was discovered in UPX in PackTmt::pack() in p_tmt.cpp file. The flow allows an attacker to cause a denial of service (abort) via a crafted file.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 0.9%
CVSS Severity
CVSS v3 Score 5.3
References
Products affected by CVE-2023-23456
  • Upx » Upx » Version: N/A
    cpe:2.3:a:upx:upx:-
  • Upx » Upx » Version: 1.10
    cpe:2.3:a:upx:upx:1.10
  • Upx » Upx » Version: 1.11
    cpe:2.3:a:upx:upx:1.11
  • Upx » Upx » Version: 1.90
    cpe:2.3:a:upx:upx:1.90
  • Upx » Upx » Version: 1.91
    cpe:2.3:a:upx:upx:1.91
  • Upx » Upx » Version: 1.92
    cpe:2.3:a:upx:upx:1.92
  • Upx » Upx » Version: 1.93
    cpe:2.3:a:upx:upx:1.93
  • Upx » Upx » Version: 1.94
    cpe:2.3:a:upx:upx:1.94
  • Upx » Upx » Version: 1.95
    cpe:2.3:a:upx:upx:1.95
  • Upx » Upx » Version: 1.96
    cpe:2.3:a:upx:upx:1.96
  • Upx » Upx » Version: 2.00
    cpe:2.3:a:upx:upx:2.00
  • Upx » Upx » Version: 2.01
    cpe:2.3:a:upx:upx:2.01
  • Upx » Upx » Version: 2.90
    cpe:2.3:a:upx:upx:2.90
  • Upx » Upx » Version: 2.91
    cpe:2.3:a:upx:upx:2.91
  • Upx » Upx » Version: 2.92
    cpe:2.3:a:upx:upx:2.92
  • Upx » Upx » Version: 2.93
    cpe:2.3:a:upx:upx:2.93
  • Upx » Upx » Version: 2022-11-23
    cpe:2.3:a:upx:upx:2022-11-23
  • Upx » Upx » Version: 3.00
    cpe:2.3:a:upx:upx:3.00
  • Upx » Upx » Version: 3.01
    cpe:2.3:a:upx:upx:3.01
  • Upx » Upx » Version: 3.02
    cpe:2.3:a:upx:upx:3.02
  • Upx » Upx » Version: 3.03
    cpe:2.3:a:upx:upx:3.03
  • Upx » Upx » Version: 3.04
    cpe:2.3:a:upx:upx:3.04
  • Upx » Upx » Version: 3.05
    cpe:2.3:a:upx:upx:3.05
  • Upx » Upx » Version: 3.06
    cpe:2.3:a:upx:upx:3.06
  • Upx » Upx » Version: 3.07
    cpe:2.3:a:upx:upx:3.07
  • Upx » Upx » Version: 3.08
    cpe:2.3:a:upx:upx:3.08
  • Upx » Upx » Version: 3.09
    cpe:2.3:a:upx:upx:3.09
  • Upx » Upx » Version: 3.91
    cpe:2.3:a:upx:upx:3.91
  • Upx » Upx » Version: 3.92
    cpe:2.3:a:upx:upx:3.92
  • Upx » Upx » Version: 3.93
    cpe:2.3:a:upx:upx:3.93
  • Upx » Upx » Version: 3.94
    cpe:2.3:a:upx:upx:3.94
  • Upx » Upx » Version: 3.95
    cpe:2.3:a:upx:upx:3.95
  • Upx » Upx » Version: 3.96
    cpe:2.3:a:upx:upx:3.96
  • Upx » Upx » Version: 4.0.0
    cpe:2.3:a:upx:upx:4.0.0
  • Upx » Upx » Version: 4.0.1
    cpe:2.3:a:upx:upx:4.0.1
  • Upx » Upx » Version: 4.0.2
    cpe:2.3:a:upx:upx:4.0.2
  • Upx » Upx » Version: 4.1.0
    cpe:2.3:a:upx:upx:4.1.0
  • Upx » Upx » Version: 4.2.0
    cpe:2.3:a:upx:upx:4.2.0
  • Upx » Upx » Version: 4.2.1
    cpe:2.3:a:upx:upx:4.2.1
  • Upx » Upx » Version: 4.2.2
    cpe:2.3:a:upx:upx:4.2.2
  • Upx » Upx » Version: 4.2.3
    cpe:2.3:a:upx:upx:4.2.3
  • Upx » Upx » Version: 4.2.4
    cpe:2.3:a:upx:upx:4.2.4
  • Upx » Upx » Version: 5.0.0
    cpe:2.3:a:upx:upx:5.0.0
  • Fedoraproject » Fedora » Version: 36
    cpe:2.3:o:fedoraproject:fedora:36
  • Fedoraproject » Fedora » Version: 37
    cpe:2.3:o:fedoraproject:fedora:37


Contact Us

Shodan ® - All rights reserved