Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-4788

Опубликовано: 04 окт. 2013
Источник: ubuntu
Приоритет: low
CVSS2: 5.1

Описание

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.

РелизСтатусПримечание
devel

not-affected

2.18-0ubuntu1
esm-infra-legacy/trusty

not-affected

2.18-0ubuntu1
lucid

ignored

precise

ignored

quantal

ignored

end of life
raring

ignored

end of life
saucy

ignored

trusty

not-affected

2.18-0ubuntu1
trusty/esm

not-affected

2.18-0ubuntu1
upstream

needed

Показывать по

5.1 Medium

CVSS2

Связанные уязвимости

redhat
больше 12 лет назад

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.

nvd
больше 12 лет назад

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.

debian
больше 12 лет назад

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6 ...

github
больше 3 лет назад

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.

fstec
больше 12 лет назад

Уязвимость библиотек, обеспечивающих системные вызовы и основные функции glibc и eglibc, позволяющая нарушителю контролировать исполнение потока

5.1 Medium

CVSS2