Описание
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.18-0ubuntu1 |
| esm-infra-legacy/trusty | not-affected | 2.18-0ubuntu1 |
| lucid | ignored | |
| precise | ignored | |
| quantal | ignored | end of life |
| raring | ignored | end of life |
| saucy | ignored | |
| trusty | not-affected | 2.18-0ubuntu1 |
| trusty/esm | not-affected | 2.18-0ubuntu1 |
| upstream | needed |
Показывать по
5.1 Medium
CVSS2
Связанные уязвимости
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6 ...
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
Уязвимость библиотек, обеспечивающих системные вызовы и основные функции glibc и eglibc, позволяющая нарушителю контролировать исполнение потока
5.1 Medium
CVSS2