Search criteria

1 vulnerability by lief-project

CVE-2025-15504 (GCVE-0-2025-15504)

Vulnerability from cvelistv5 – Published: 2026-01-10 11:32 – Updated: 2026-02-23 08:28 X_Open Source
VLAI?
Title
lief-project LIEF ELF Binary Parser.tcc parse_binary null pointer dereference
Summary
A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.
CWE
Assigner
Impacted products
Vendor Product Version
lief-project LIEF Affected: 0.17.0
Affected: 0.17.1
Unaffected: 0.17.2
    cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*
Create a notification for this product.
Credits
Oneafter (VulDB User)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-15504",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-01-12T14:45:40.439497Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-01-12T14:45:44.884Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "exploit"
            ],
            "url": "https://vuldb.com/?submit.733329"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/lief-project/LIEF/issues/1277"
          },
          {
            "tags": [
              "exploit"
            ],
            "url": "https://github.com/lief-project/LIEF/issues/1277#issuecomment-3693859001"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "cpes": [
            "cpe:2.3:a:lief-project:lief:*:*:*:*:*:*:*:*"
          ],
          "modules": [
            "ELF Binary Parser"
          ],
          "product": "LIEF",
          "vendor": "lief-project",
          "versions": [
            {
              "status": "affected",
              "version": "0.17.0"
            },
            {
              "status": "affected",
              "version": "0.17.1"
            },
            {
              "status": "unaffected",
              "version": "0.17.2"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Oneafter (VulDB User)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
            "version": "4.0"
          }
        },
        {
          "cvssV3_1": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.1"
          }
        },
        {
          "cvssV3_0": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
            "version": "3.0"
          }
        },
        {
          "cvssV2_0": {
            "baseScore": 1.7,
            "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C",
            "version": "2.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-404",
              "description": "Denial of Service",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-23T08:28:41.928Z",
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB"
      },
      "references": [
        {
          "name": "VDB-340375 | lief-project LIEF ELF Binary Parser.tcc parse_binary null pointer dereference",
          "tags": [
            "vdb-entry",
            "technical-description"
          ],
          "url": "https://vuldb.com/?id.340375"
        },
        {
          "name": "VDB-340375 | CTI Indicators (IOB, IOC, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ],
          "url": "https://vuldb.com/?ctiid.340375"
        },
        {
          "name": "Submit #733329 | lief-project LIEF  9698ea6 Memory Corruption",
          "tags": [
            "third-party-advisory"
          ],
          "url": "https://vuldb.com/?submit.733329"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/lief-project/LIEF/issues/1277"
        },
        {
          "tags": [
            "issue-tracking"
          ],
          "url": "https://github.com/lief-project/LIEF/issues/1277#issuecomment-3693859001"
        },
        {
          "tags": [
            "exploit"
          ],
          "url": "https://github.com/oneafter/1210/blob/main/segv1"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/lief-project/LIEF/commit/81bd5d7ea0c390563f1c4c017c9019d154802978"
        },
        {
          "tags": [
            "patch"
          ],
          "url": "https://github.com/lief-project/LIEF/releases/tag/0.17.2"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://github.com/lief-project/LIEF/"
        }
      ],
      "tags": [
        "x_open-source"
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2026-01-09T00:00:00.000Z",
          "value": "Advisory disclosed"
        },
        {
          "lang": "en",
          "time": "2026-01-09T01:00:00.000Z",
          "value": "VulDB entry created"
        },
        {
          "lang": "en",
          "time": "2026-01-23T15:03:53.000Z",
          "value": "VulDB entry last update"
        }
      ],
      "title": "lief-project LIEF ELF Binary Parser.tcc parse_binary null pointer dereference"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "cveId": "CVE-2025-15504",
    "datePublished": "2026-01-10T11:32:06.771Z",
    "dateReserved": "2026-01-09T21:58:56.818Z",
    "dateUpdated": "2026-02-23T08:28:41.928Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}