VYPR
High severityNVD Advisory· Published Nov 17, 2022· Updated Apr 29, 2025

CVE-2022-43171

CVE-2022-43171

Description

A heap buffer overflow in the LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind function of LIEF v0.12.1 allows attackers to cause a Denial of Service (DoS) via a crafted MachO file.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A heap-buffer-overflow in LIEF's MachO parser allows denial of service via a crafted Mach-O file.

Vulnerability

Analysis

CVE-2022-43171 is a heap-buffer-overflow vulnerability identified in the LIEF library (version 0.12.1) in the function LIEF::MachO::BinaryParser::parse_dyldinfo_generic_bind. The issue occurs when parsing a maliciously crafted Mach-O file. The root cause is insufficient validation of dyld info bind data, leading to an out-of-bounds read on the heap [1].

Exploitation

An attacker can trigger this vulnerability by providing a specially crafted Mach-O file to an application that uses LIEF to parse Mach-O files, such as security analyzers, packers, or fuzzers. The attack requires no special privileges beyond the ability to supply the malicious file to the vulnerable library. The overflow is triggered during the parsing process when LIEF attempts to access segment commands using an index derived from corrupted data, as shown in the AddressSanitizer report: "Indirect symbol index is out of range" and subsequent heap-buffer-overflow at ref_iterator dereference [1].

Impact

Successful exploitation leads to a denial of service (DoS) due to the heap-buffer-overflow, potentially causing application crashes. The vulnerability can also lead to memory corruption, which in some environments could be leveraged for further exploitation, although the primary impact as documented is DoS [3].

Mitigation

The issue was reported via LIEF's GitHub issue tracker and is fixed in subsequent releases. Users should update to LIEF version 0.12.2 or later. The advisory database for PyPI also notes this vulnerability for the Python package, underscoring the need for upgraded versions [4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
liefPyPI
< 0.12.30.12.3

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.