Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2016/08/17/6 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/92530 | Third Party Advisory VDB Entry |
https://bugzilla.redhat.com/show_bug.cgi?id=1324759 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2017-06-07 20:29
Updated : 2024-02-04 19:29
NVD link : CVE-2016-4973
Mitre link : CVE-2016-4973
CVE.ORG link : CVE-2016-4973
JSON object : View
Products Affected
gnu
- libssp
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer