Home

Description

A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.

PUBLISHED Reserved 2026-01-09 | Published 2026-01-10 | Updated 2026-01-12 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
LOW: 3.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C
1.7AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C

Problem types

NULL Pointer Dereference

Denial of Service

Product status

0.17.0
affected

0.17.1
affected

0.17.2
unaffected

Timeline

2026-01-09:Advisory disclosed
2026-01-09:VulDB entry created
2026-01-09:VulDB entry last update

Credits

Oneafter (VulDB User) reporter

References

vuldb.com/?submit.733329 exploit

github.com/lief-project/LIEF/issues/1277 exploit

github.com/lief-project/LIEF/issues/1277 exploit

vuldb.com/?id.340375 (VDB-340375 | lief-project LIEF ELF Binary Parser.tcc parse_binary null pointer dereference) vdb-entry technical-description

vuldb.com/?ctiid.340375 (VDB-340375 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.733329 (Submit #733329 | lief-project LIEF 9698ea6 Memory Corruption) third-party-advisory

github.com/lief-project/LIEF/issues/1277 issue-tracking

github.com/lief-project/LIEF/issues/1277 issue-tracking

github.com/oneafter/1210/blob/main/segv1 exploit

github.com/...ommit/81bd5d7ea0c390563f1c4c017c9019d154802978 patch

github.com/lief-project/LIEF/releases/tag/0.17.2 patch

cve.org (CVE-2025-15504)

nvd.nist.gov (CVE-2025-15504)

Download JSON