Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15504: NULL Pointer Dereference in lief-project LIEF

0
Medium
VulnerabilityCVE-2025-15504cvecve-2025-15504
Published: Sat Jan 10 2026 (01/10/2026, 11:32:06 UTC)
Source: CVE Database V5
Vendor/Project: lief-project
Product: LIEF

Description

A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:40:25 UTC

Technical Analysis

CVE-2025-15504 identifies a null pointer dereference vulnerability in the LIEF (Library to Instrument Executable Formats) project, specifically affecting versions 0.17.0 and 0.17.1. The flaw resides in the ELF binary parser component, within the Parser::parse_binary function in the src/ELF/Parser.tcc source file. When parsing crafted ELF binaries, the function may dereference a null pointer due to insufficient validation or error handling, leading to a crash or denial of service. The vulnerability requires local access with low privileges to trigger, meaning an attacker must have the ability to execute code or interact with the vulnerable LIEF component on the host system. No user interaction or elevated privileges are necessary beyond local access. The vulnerability has a CVSS 4.8 (medium) score, reflecting limited impact and exploit complexity. The issue was publicly disclosed with an available proof-of-concept exploit, increasing the risk of exploitation. The LIEF project has addressed the vulnerability in version 0.17.2, with a patch identified by commit 81bd5d7ea0c390563f1c4c017c9019d154802978. LIEF is widely used in security research, malware analysis, and reverse engineering tools to parse and manipulate executable formats such as ELF, PE, and Mach-O. This vulnerability could impact any software or environment that integrates the vulnerable LIEF versions for ELF binary parsing, potentially causing crashes or denial of service conditions during binary analysis or instrumentation.

Potential Impact

The primary impact of CVE-2025-15504 is denial of service through application crashes caused by null pointer dereference when processing maliciously crafted ELF binaries. This can disrupt security tools, reverse engineering platforms, or automated malware analysis pipelines that depend on LIEF for ELF parsing. While the vulnerability does not allow privilege escalation or remote code execution, the availability impact can hinder incident response, malware detection, or software analysis workflows. Organizations relying on LIEF in their security infrastructure may experience interruptions or reduced effectiveness of their tooling. Since exploitation requires local access, the threat is more significant in environments where untrusted users or processes can submit ELF binaries for analysis, such as shared research environments, CI/CD pipelines, or multi-tenant systems. The public availability of an exploit increases the likelihood of opportunistic attacks aiming to cause service disruption. However, the lack of remote exploitability and the medium CVSS score limit the overall severity. Timely patching will mitigate the risk and restore operational stability.

Mitigation Recommendations

To mitigate CVE-2025-15504, organizations should upgrade all instances of the LIEF library to version 0.17.2 or later, which contains the official patch for the null pointer dereference. For environments where immediate upgrading is not feasible, consider implementing input validation or sandboxing measures to restrict the processing of untrusted ELF binaries. Employ strict access controls to limit local user permissions and prevent untrusted users from interacting with LIEF-dependent components. Monitor logs and application behavior for crashes or anomalies indicative of exploitation attempts. Integrate fuzz testing and static analysis into development pipelines to detect similar parsing vulnerabilities proactively. Additionally, isolate analysis environments to reduce the impact of potential denial of service. Maintain awareness of updates from the LIEF project and security advisories to promptly apply future patches. Finally, review and harden the security posture of systems that allow local users to submit ELF binaries for analysis or instrumentation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T21:58:56.818Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69623af0545d6fe9686cca16

Added to database: 1/10/2026, 11:41:36 AM

Last enriched: 2/23/2026, 10:40:25 PM

Last updated: 3/24/2026, 11:57:57 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses