Количество 10
Количество 10
CVE-2013-4788
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
CVE-2013-4788
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
CVE-2013-4788
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
CVE-2013-4788
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6 ...
GHSA-xh2f-h76w-4qqc
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
BDU:2016-02233
Уязвимость библиотек, обеспечивающих системные вызовы и основные функции glibc и eglibc, позволяющая нарушителю контролировать исполнение потока
SUSE-SU-2015:0439-1
Security update for glibc
SUSE-SU-2015:0253-1
Security update for glibc
SUSE-RU-2015:0794-1
Security update for glibc
SUSE-SU-2015:0551-1
Security update for glibc
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2013-4788 The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address. | CVSS2: 5.1 | 8% Низкий | больше 12 лет назад | |
CVE-2013-4788 The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address. | CVSS2: 3.7 | 8% Низкий | больше 12 лет назад | |
CVE-2013-4788 The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address. | CVSS2: 5.1 | 8% Низкий | больше 12 лет назад | |
CVE-2013-4788 The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6 ... | CVSS2: 5.1 | 8% Низкий | больше 12 лет назад | |
GHSA-xh2f-h76w-4qqc The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address. | 8% Низкий | больше 3 лет назад | ||
BDU:2016-02233 Уязвимость библиотек, обеспечивающих системные вызовы и основные функции glibc и eglibc, позволяющая нарушителю контролировать исполнение потока | CVSS2: 5.1 | 8% Низкий | больше 12 лет назад | |
SUSE-SU-2015:0439-1 Security update for glibc | больше 11 лет назад | |||
SUSE-SU-2015:0253-1 Security update for glibc | больше 11 лет назад | |||
SUSE-RU-2015:0794-1 Security update for glibc | больше 11 лет назад | |||
SUSE-SU-2015:0551-1 Security update for glibc | больше 12 лет назад |
Уязвимостей на страницу