-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
There is a heap-buffer-overflow in the canUnpack function of p_mach.cpp:1539 #315
Milestone
Comments
Fixed at tip of
Omit the |
CVE-2019-20021 has been assigned for thi issue. |
Did a fix for this ship in 3.96? I checked the release notes and couldn't find a mention of CVE-2019-20021 |
Issues generally are tracked by Github issue number. UPX ignores CVE; the CVE system is trash which should be carried out and discarded.
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
A crafted input will lead to crash in p_mach.cpp at UPX 3.95(latest version,git clone from branch devel)
Triggered by
./upx.out -d -f POC
OS: Ubuntu 18.04.3 LTS
CPU architecture: x86_64
Poc
002
The ASAN information is as follows:
The text was updated successfully, but these errors were encountered: