Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-4973

Опубликовано: 17 авг. 2016
Источник: redhat
CVSS3: 3.6
EPSS Низкий

Описание

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

It was found that targets using gcc's libssp library for Stack Smashing Protection (among others: Cygwin, MinGW, newlib, RTEMS; but not Glibc, Bionic, NetBSD which provide SSP in libc), are missing the Object Size Checking feature, even when explicitly requested with _FORTIFY_SOURCE. Vulnerable binaries compiled against such targets do not benefit of such protection, increasing the chances of success of a buffer overflow attack.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5compat-gcc-295Not affected
Red Hat Enterprise Linux 5compat-gcc-296Not affected
Red Hat Enterprise Linux 5compat-gcc-32Not affected
Red Hat Enterprise Linux 5compat-gcc-34Not affected
Red Hat Enterprise Linux 5gccNot affected
Red Hat Enterprise Linux 5gcc44Not affected
Red Hat Enterprise Linux 6compat-gcc-295Not affected
Red Hat Enterprise Linux 6compat-gcc-296Not affected
Red Hat Enterprise Linux 6compat-gcc-32Not affected
Red Hat Enterprise Linux 6compat-gcc-34Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1324759gcc: Targets using libssp for SSP are missing -D_FORTIFY_SOURCE functionality

EPSS

Процентиль: 9%
0.00034
Низкий

3.6 Low

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 8 лет назад

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

CVSS3: 7.8
nvd
больше 8 лет назад

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

CVSS3: 7.8
debian
больше 8 лет назад

Binaries compiled against targets that use the libssp library in GCC f ...

CVSS3: 7.8
github
больше 3 лет назад

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

EPSS

Процентиль: 9%
0.00034
Низкий

3.6 Low

CVSS3