Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2023-23457

A Segmentation fault was found in UPX in PackLinuxElf64::invert_pt_dynamic() in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 4.3%
CVSS Severity
CVSS v3 Score 5.3
References
Products affected by CVE-2023-23457
  • Upx » Upx » Version: N/A
    cpe:2.3:a:upx:upx:-
  • Upx » Upx » Version: 1.10
    cpe:2.3:a:upx:upx:1.10
  • Upx » Upx » Version: 1.11
    cpe:2.3:a:upx:upx:1.11
  • Upx » Upx » Version: 1.90
    cpe:2.3:a:upx:upx:1.90
  • Upx » Upx » Version: 1.91
    cpe:2.3:a:upx:upx:1.91
  • Upx » Upx » Version: 1.92
    cpe:2.3:a:upx:upx:1.92
  • Upx » Upx » Version: 1.93
    cpe:2.3:a:upx:upx:1.93
  • Upx » Upx » Version: 1.94
    cpe:2.3:a:upx:upx:1.94
  • Upx » Upx » Version: 1.95
    cpe:2.3:a:upx:upx:1.95
  • Upx » Upx » Version: 1.96
    cpe:2.3:a:upx:upx:1.96
  • Upx » Upx » Version: 2.00
    cpe:2.3:a:upx:upx:2.00
  • Upx » Upx » Version: 2.01
    cpe:2.3:a:upx:upx:2.01
  • Upx » Upx » Version: 2.90
    cpe:2.3:a:upx:upx:2.90
  • Upx » Upx » Version: 2.91
    cpe:2.3:a:upx:upx:2.91
  • Upx » Upx » Version: 2.92
    cpe:2.3:a:upx:upx:2.92
  • Upx » Upx » Version: 2.93
    cpe:2.3:a:upx:upx:2.93
  • Upx » Upx » Version: 3.00
    cpe:2.3:a:upx:upx:3.00
  • Upx » Upx » Version: 3.01
    cpe:2.3:a:upx:upx:3.01
  • Upx » Upx » Version: 3.02
    cpe:2.3:a:upx:upx:3.02
  • Upx » Upx » Version: 3.03
    cpe:2.3:a:upx:upx:3.03
  • Upx » Upx » Version: 3.04
    cpe:2.3:a:upx:upx:3.04
  • Upx » Upx » Version: 3.05
    cpe:2.3:a:upx:upx:3.05
  • Upx » Upx » Version: 3.06
    cpe:2.3:a:upx:upx:3.06
  • Upx » Upx » Version: 3.07
    cpe:2.3:a:upx:upx:3.07
  • Upx » Upx » Version: 3.08
    cpe:2.3:a:upx:upx:3.08
  • Upx » Upx » Version: 3.09
    cpe:2.3:a:upx:upx:3.09
  • Upx » Upx » Version: 3.91
    cpe:2.3:a:upx:upx:3.91
  • Upx » Upx » Version: 3.92
    cpe:2.3:a:upx:upx:3.92
  • Upx » Upx » Version: 3.93
    cpe:2.3:a:upx:upx:3.93
  • Upx » Upx » Version: 3.94
    cpe:2.3:a:upx:upx:3.94
  • Upx » Upx » Version: 3.95
    cpe:2.3:a:upx:upx:3.95
  • Upx » Upx » Version: 3.96
    cpe:2.3:a:upx:upx:3.96
  • Upx » Upx » Version: 4.0.0
    cpe:2.3:a:upx:upx:4.0.0
  • Upx » Upx » Version: 4.0.1
    cpe:2.3:a:upx:upx:4.0.1
  • Upx » Upx » Version: 4.0.2
    cpe:2.3:a:upx:upx:4.0.2
  • Upx » Upx » Version: 4.1.0
    cpe:2.3:a:upx:upx:4.1.0
  • Upx » Upx » Version: 4.2.0
    cpe:2.3:a:upx:upx:4.2.0
  • Upx » Upx » Version: 4.2.1
    cpe:2.3:a:upx:upx:4.2.1
  • Upx » Upx » Version: 4.2.2
    cpe:2.3:a:upx:upx:4.2.2
  • Upx » Upx » Version: 4.2.3
    cpe:2.3:a:upx:upx:4.2.3
  • Upx » Upx » Version: 4.2.4
    cpe:2.3:a:upx:upx:4.2.4
  • Upx » Upx » Version: 5.0.0
    cpe:2.3:a:upx:upx:5.0.0
  • Fedoraproject » Fedora » Version: 36
    cpe:2.3:o:fedoraproject:fedora:36
  • Fedoraproject » Fedora » Version: 37
    cpe:2.3:o:fedoraproject:fedora:37


Contact Us

Shodan ® - All rights reserved