CVE-2025-15504

Source
https://cve.org/CVERecord?id=CVE-2025-15504
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15504.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-15504
Aliases
Published
2026-01-10T12:15:49.570Z
Modified
2026-03-15T22:50:30.195637Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.

References

Affected packages

Git / github.com/lief-project/lief

Affected ranges

Type
GIT
Repo
https://github.com/lief-project/lief
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "0.17.2"
        }
    ]
}

Affected versions

0.*
0.10.0
0.10.1
0.11.0
0.12.0
0.13.0
0.14.0
0.15.0
0.16.0
0.17.0
0.17.1
0.6.0
0.6.1
0.7.0
0.8.0
0.8.1
0.8.2
0.8.3
0.9.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-15504.json"