Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-4039

Опубликовано: 12 сент. 2023
Источник: redhat
CVSS3: 0

Описание

DISPUTEDA failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

A vulnerability was found in GCC. The GCC's stack protection feature, enabled with the flag -fstack-protector, aims to detect buffer overflows in C/C++ function local variables that might allow an attacker to overwrite saved registers on the stack. If an attacker can modify saved register values, it may be possible for them to subvert program flow control. The feature operates by placing a canary value between local variables and saved registers on the stack on function entry and triggers an error handler on function exit if the canary value has been unexpectedly modified. When targeting AArch64, this feature did not protect the saved registers from overflows in C99-style dynamically-sized local variables and alloca() objects. Other local variables, including statically-sized local arrays, are not affected because of their different placement on the stack relative to saved registers.

Отчет

According to the GCC security policy, both upstream and Red Hat Product Security do not consider this to be a vulnerability. Please refer to the following URLs for more information:

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Cryostat 2gccNot affected
Migration Toolkit for ContainersgccNot affected
Red Hat 3scale API Management Platform 2gccNot affected
Red Hat Advanced Cluster Management for Kubernetes 2gccFix deferred
Red Hat Enterprise Linux 6compat-gcc-295Out of support scope
Red Hat Enterprise Linux 6compat-gcc-296Out of support scope
Red Hat Enterprise Linux 6compat-gcc-32Out of support scope
Red Hat Enterprise Linux 6compat-gcc-34Out of support scope
Red Hat Enterprise Linux 6gccOut of support scope
Red Hat Enterprise Linux 7compat-gcc-32Out of support scope

Показывать по

Дополнительная информация

Дефект:
CWE-119
Дефект:
CWE-358
https://bugzilla.redhat.com/show_bug.cgi?id=2233236gcc: -fstack-protector fails to guard dynamic stack allocations on ARM64

0 Low

CVSS3

Связанные уязвимости

CVSS3: 4.8
ubuntu
почти 2 года назад

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVSS3: 4.8
nvd
почти 2 года назад

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVSS3: 4.8
msrc
почти 2 года назад

Описание отсутствует

CVSS3: 4.8
debian
почти 2 года назад

**DISPUTED**A failure in the -fstack-protector feature in GCC-based to ...

suse-cvrf
больше 1 года назад

Security update for gcc13

0 Low

CVSS3