Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12886

Опубликовано: 22 мая 2019
Источник: redhat
CVSS3: 6.8

Описание

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 4gccNot affected
Red Hat Enterprise Linux 4gcc4Not affected
Red Hat Enterprise Linux 5gccNot affected
Red Hat Enterprise Linux 5gcc44Not affected
Red Hat Enterprise Linux 6gccNot affected
Red Hat Enterprise Linux 7gccNot affected
Red Hat Enterprise Linux 8gccNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=1715823gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass

6.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
больше 6 лет назад

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

CVSS3: 8.1
nvd
больше 6 лет назад

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

CVSS3: 8.1
debian
больше 6 лет назад

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in fu ...

github
больше 3 лет назад

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

CVSS3: 8.1
fstec
больше 6 лет назад

Уязвимость функций stack_protect_prologue и stack_protect_epilogue набора компиляторов для различных языков программирования GNU Compiler Collection (GCC), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

6.8 Medium

CVSS3