Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15504: NULL Pointer Dereference in lief-project LIEF

0
Medium
VulnerabilityCVE-2025-15504cvecve-2025-15504
Published: Sat Jan 10 2026 (01/10/2026, 11:32:06 UTC)
Source: CVE Database V5
Vendor/Project: lief-project
Product: LIEF

Description

A security flaw has been discovered in lief-project LIEF up to 0.17.1. Affected by this issue is the function Parser::parse_binary of the file src/ELF/Parser.tcc of the component ELF Binary Parser. The manipulation results in null pointer dereference. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. Upgrading to version 0.17.2 can resolve this issue. The patch is identified as 81bd5d7ea0c390563f1c4c017c9019d154802978. It is recommended to upgrade the affected component.

AI-Powered Analysis

AILast updated: 01/10/2026, 11:56:09 UTC

Technical Analysis

CVE-2025-15504 is a vulnerability identified in the LIEF (Library to Instrument Executable Formats) project, specifically affecting versions 0.17.0 and 0.17.1. The flaw resides in the ELF binary parser component, within the Parser::parse_binary function located in src/ELF/Parser.tcc. The vulnerability manifests as a null pointer dereference when processing crafted ELF binaries, which can cause the application using LIEF to crash or behave unexpectedly. The attack vector requires local access with limited privileges (local attack vector with low complexity) and does not require user interaction or elevated privileges. The vulnerability does not compromise confidentiality or integrity but impacts availability by causing denial of service conditions. The vulnerability has a CVSS 4.8 (medium) score, reflecting its limited impact and exploitation complexity. A public exploit has been released, increasing the risk of exploitation in local environments. The issue is patched in LIEF version 0.17.2, with the fix identified by commit 81bd5d7ea0c390563f1c4c017c9019d154802978. Organizations relying on LIEF for ELF binary parsing, such as in malware analysis, reverse engineering, or security tooling, should upgrade promptly to mitigate risks.

Potential Impact

For European organizations, the primary impact is the potential for denial of service on systems utilizing LIEF for ELF binary parsing, which could disrupt security tools, malware analysis platforms, or software development pipelines. Since exploitation requires local access, the threat is mainly to internal systems or environments where untrusted users have local accounts or can execute code. The availability impact could lead to operational delays or interruptions in security monitoring and analysis workflows. There is no direct risk to data confidentiality or integrity from this vulnerability. However, the presence of a public exploit increases the likelihood of opportunistic attacks in environments where LIEF is deployed. Organizations in sectors with high reliance on ELF binary analysis, such as cybersecurity firms, software vendors, and research institutions, may experience more significant operational impacts.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade LIEF to version 0.17.2 or later, which contains the patch for this null pointer dereference issue. Additionally, restrict local access to systems running LIEF-based tools to trusted users only, minimizing the risk of local exploitation. Implement strict access controls and monitoring on systems where ELF parsing occurs, especially in shared or multi-user environments. Employ application whitelisting and endpoint protection to detect and prevent execution of untrusted ELF binaries that could trigger the vulnerability. Regularly audit and update all dependencies in software development and analysis environments to ensure timely application of security patches. Finally, consider sandboxing or isolating ELF parsing operations to limit the impact of potential crashes or denial of service conditions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T21:58:56.818Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69623af0545d6fe9686cca16

Added to database: 1/10/2026, 11:41:36 AM

Last enriched: 1/10/2026, 11:56:09 AM

Last updated: 1/11/2026, 1:56:27 AM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats