Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4973

Опубликовано: 07 июн. 2017
Источник: debian

Описание

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gcc-6not-affectedpackage
gcc-5not-affectedpackage
gcc-4.9not-affectedpackage
gcc-mingw-w64unfixedpackage
mingw32removedpackage
mingw32no-dsawheezypackage

Примечания

  • https://bugzilla.redhat.com/show_bug.cgi?id=1324759

  • Missing security feature, not a direct vulnerability

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

CVSS3: 3.6
redhat
больше 9 лет назад

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

CVSS3: 7.8
nvd
больше 8 лет назад

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

CVSS3: 7.8
github
больше 3 лет назад

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.