Lucene search

K
cve[email protected]CVE-2024-3209
HistoryApr 02, 2024 - 11:15 p.m.

CVE-2024-3209

2024-04-0223:15:55
CWE-122
web.nvd.nist.gov
39
upx
critical
buffer overflow
get_ne64
vdb-259055
disclosure
public exploit

5.2 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

5.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.5%

A vulnerability was found in UPX up to 4.2.2. It has been rated as critical. This issue affects the function get_ne64 of the file bele.h. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259055. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Affected configurations

Vulners
Node
upx_projectupxMatch4.2.0
OR
upx_projectupxMatch4.2.1
OR
upx_projectupxMatch4.2.2
VendorProductVersionCPE
upx_projectupx4.2.0cpe:2.3:a:upx_project:upx:4.2.0:*:*:*:*:*:*:*
upx_projectupx4.2.1cpe:2.3:a:upx_project:upx:4.2.1:*:*:*:*:*:*:*
upx_projectupx4.2.2cpe:2.3:a:upx_project:upx:4.2.2:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "UPX",
    "versions": [
      {
        "version": "4.2.0",
        "status": "affected"
      },
      {
        "version": "4.2.1",
        "status": "affected"
      },
      {
        "version": "4.2.2",
        "status": "affected"
      }
    ]
  }
]

5.2 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:P/I:P/A:P

5.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

6.4 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

10.5%