Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2024-3209

A vulnerability was found in UPX up to 4.2.2. It has been rated as critical. This issue affects the function get_ne64 of the file bele.h. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259055. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 45.5%
CVSS Severity
CVSS v3 Score 5.5
CVSS v2 Score 5.2
References
Products affected by CVE-2024-3209
  • Upx » Upx » Version: N/A
    cpe:2.3:a:upx:upx:-
  • Upx » Upx » Version: 1.10
    cpe:2.3:a:upx:upx:1.10
  • Upx » Upx » Version: 1.11
    cpe:2.3:a:upx:upx:1.11
  • Upx » Upx » Version: 1.90
    cpe:2.3:a:upx:upx:1.90
  • Upx » Upx » Version: 1.91
    cpe:2.3:a:upx:upx:1.91
  • Upx » Upx » Version: 1.92
    cpe:2.3:a:upx:upx:1.92
  • Upx » Upx » Version: 1.93
    cpe:2.3:a:upx:upx:1.93
  • Upx » Upx » Version: 1.94
    cpe:2.3:a:upx:upx:1.94
  • Upx » Upx » Version: 1.95
    cpe:2.3:a:upx:upx:1.95
  • Upx » Upx » Version: 1.96
    cpe:2.3:a:upx:upx:1.96
  • Upx » Upx » Version: 2.00
    cpe:2.3:a:upx:upx:2.00
  • Upx » Upx » Version: 2.01
    cpe:2.3:a:upx:upx:2.01
  • Upx » Upx » Version: 2.90
    cpe:2.3:a:upx:upx:2.90
  • Upx » Upx » Version: 2.91
    cpe:2.3:a:upx:upx:2.91
  • Upx » Upx » Version: 2.92
    cpe:2.3:a:upx:upx:2.92
  • Upx » Upx » Version: 2.93
    cpe:2.3:a:upx:upx:2.93
  • Upx » Upx » Version: 3.00
    cpe:2.3:a:upx:upx:3.00
  • Upx » Upx » Version: 3.01
    cpe:2.3:a:upx:upx:3.01
  • Upx » Upx » Version: 3.02
    cpe:2.3:a:upx:upx:3.02
  • Upx » Upx » Version: 3.03
    cpe:2.3:a:upx:upx:3.03
  • Upx » Upx » Version: 3.04
    cpe:2.3:a:upx:upx:3.04
  • Upx » Upx » Version: 3.05
    cpe:2.3:a:upx:upx:3.05
  • Upx » Upx » Version: 3.06
    cpe:2.3:a:upx:upx:3.06
  • Upx » Upx » Version: 3.07
    cpe:2.3:a:upx:upx:3.07
  • Upx » Upx » Version: 3.08
    cpe:2.3:a:upx:upx:3.08
  • Upx » Upx » Version: 3.09
    cpe:2.3:a:upx:upx:3.09
  • Upx » Upx » Version: 3.91
    cpe:2.3:a:upx:upx:3.91
  • Upx » Upx » Version: 3.92
    cpe:2.3:a:upx:upx:3.92
  • Upx » Upx » Version: 3.93
    cpe:2.3:a:upx:upx:3.93
  • Upx » Upx » Version: 3.94
    cpe:2.3:a:upx:upx:3.94
  • Upx » Upx » Version: 3.95
    cpe:2.3:a:upx:upx:3.95
  • Upx » Upx » Version: 3.96
    cpe:2.3:a:upx:upx:3.96
  • Upx » Upx » Version: 4.0.0
    cpe:2.3:a:upx:upx:4.0.0
  • Upx » Upx » Version: 4.0.1
    cpe:2.3:a:upx:upx:4.0.1
  • Upx » Upx » Version: 4.0.2
    cpe:2.3:a:upx:upx:4.0.2
  • Upx » Upx » Version: 4.1.0
    cpe:2.3:a:upx:upx:4.1.0
  • Upx » Upx » Version: 4.2.0
    cpe:2.3:a:upx:upx:4.2.0
  • Upx » Upx » Version: 4.2.1
    cpe:2.3:a:upx:upx:4.2.1
  • Upx » Upx » Version: 4.2.2
    cpe:2.3:a:upx:upx:4.2.2
  • Fedoraproject » Fedora » Version: 38
    cpe:2.3:o:fedoraproject:fedora:38
  • Fedoraproject » Fedora » Version: 39
    cpe:2.3:o:fedoraproject:fedora:39
  • Fedoraproject » Fedora » Version: 40
    cpe:2.3:o:fedoraproject:fedora:40


Contact Us

Shodan ® - All rights reserved