home.social

#heapoverflow — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #heapoverflow, aggregated by home.social.

  1. Heap Buffer Overflow in UPX Identified

    Date: March 26, 2024
    CVE: To be assigned
    Vulnerability Type: Buffer Errors
    CWE: [[CWE-122]]
    Sources: NIST VULNDB VULNDB Submit

    Issue Summary

    A heap buffer overflow vulnerability was identified in the [[UPX|Ultimate Packer for eXecutables]] (UPX), specifically in the commit 06b0de9c77551cd4e856d453e094d8a0b6ef0d6d. This issue occurs during the handling of certain data structures, leading to potential memory corruption. The vulnerability was discovered through fuzzing techniques using the Google OSS-Fuzz project.

    Technical Key findings

    The vulnerability is caused by improper handling of input data, resulting in a heap buffer overflow. This overflow occurs in the handling of packed files during decompression, where the bounds of allocated heap memory are not properly checked.

    Vulnerable products

    • [[UPX]] version identified by commit 06b0de9c77551cd4e856d453e094d8a0b6ef0d6d.

    Impact assessment

    An attacker could exploit this vulnerability to execute arbitrary code on the target system or cause a denial of service through application crash, potentially compromising the system's integrity and availability.

    Patches or workaround

    No specific patches or workarounds were mentioned at the time of reporting. Users are advised to monitor the official [[UPX]] GitHub repository for updates.

    Tags

    #UPX #BufferOverflow #HeapOverflow #SecurityVulnerability #CVE

  2. Just published a big pile of #research I did this past winter! Protocol #reverseengineering, #heapoverflow, #stackoverflow, #authbypass - lots of cool stuff. If you think this sounds cool, be sure to check out my #NorthSec talk in May :)

    Here are some links:

    If you're running #RocketSoftware's UniData or UniVerse suites, which are usually a back-end thing, you need to patch ASAP!