Логотип exploitDog
bind:"CVE-2023-4039"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2023-4039"

Количество 19

Количество 19

ubuntu логотип

CVE-2023-4039

почти 2 года назад

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVSS3: 4.8
EPSS: Низкий
redhat логотип

CVE-2023-4039

почти 2 года назад

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

EPSS: Низкий
nvd логотип

CVE-2023-4039

почти 2 года назад

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVSS3: 4.8
EPSS: Низкий
msrc логотип

CVE-2023-4039

почти 2 года назад

CVSS3: 4.8
EPSS: Низкий
debian логотип

CVE-2023-4039

почти 2 года назад

**DISPUTED**A failure in the -fstack-protector feature in GCC-based to ...

CVSS3: 4.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4480-1

больше 1 года назад

Security update for gcc13

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4458-1

больше 1 года назад

Security update for gcc13

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4287-2

больше 1 года назад

Security update for gcc13

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4287-1

больше 1 года назад

Security update for gcc13

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:4162-1

больше 1 года назад

Security update for gcc13

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3686-1

почти 2 года назад

Security update for gcc7

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3661-1

почти 2 года назад

Security update for gcc12

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3640-1

почти 2 года назад

Security update for gcc12

EPSS: Низкий
oracle-oval логотип

ELSA-2023-28766

почти 2 года назад

ELSA-2023-28766: cross-gcc security update (LOW)

EPSS: Низкий
oracle-oval логотип

ELSA-2023-28765

почти 2 года назад

ELSA-2023-28765: cross-gcc security update (LOW)

EPSS: Низкий
fstec логотип

BDU:2023-05920

почти 2 года назад

Уязвимость функции защиты стека набора компиляторов для различных языков программирования GNU Compiler Collection (GCC), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 4.8
EPSS: Низкий
redos логотип

ROS-20240911-06

9 месяцев назад

Уязвимость cross-gcc

CVSS3: 4.8
EPSS: Низкий
oracle-oval логотип

ELSA-2023-12788

почти 2 года назад

ELSA-2023-12788: gcc security update (LOW)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:3662-1

почти 2 года назад

Security update for gcc7

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-4039

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVSS3: 4.8
0%
Низкий
почти 2 года назад
redhat логотип
CVE-2023-4039

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

0%
Низкий
почти 2 года назад
nvd логотип
CVE-2023-4039

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

CVSS3: 4.8
0%
Низкий
почти 2 года назад
msrc логотип
CVSS3: 4.8
0%
Низкий
почти 2 года назад
debian логотип
CVE-2023-4039

**DISPUTED**A failure in the -fstack-protector feature in GCC-based to ...

CVSS3: 4.8
0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:4480-1

Security update for gcc13

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4458-1

Security update for gcc13

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4287-2

Security update for gcc13

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4287-1

Security update for gcc13

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:4162-1

Security update for gcc13

0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:3686-1

Security update for gcc7

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3661-1

Security update for gcc12

0%
Низкий
почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3640-1

Security update for gcc12

0%
Низкий
почти 2 года назад
oracle-oval логотип
ELSA-2023-28766

ELSA-2023-28766: cross-gcc security update (LOW)

почти 2 года назад
oracle-oval логотип
ELSA-2023-28765

ELSA-2023-28765: cross-gcc security update (LOW)

почти 2 года назад
fstec логотип
BDU:2023-05920

Уязвимость функции защиты стека набора компиляторов для различных языков программирования GNU Compiler Collection (GCC), позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации

CVSS3: 4.8
0%
Низкий
почти 2 года назад
redos логотип
ROS-20240911-06

Уязвимость cross-gcc

CVSS3: 4.8
0%
Низкий
9 месяцев назад
oracle-oval логотип
ELSA-2023-12788

ELSA-2023-12788: gcc security update (LOW)

почти 2 года назад
suse-cvrf логотип
SUSE-SU-2023:3662-1

Security update for gcc7

почти 2 года назад

Уязвимостей на страницу