CVE-2016-4973

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
References
Link Resource
http://www.openwall.com/lists/oss-security/2016/08/17/6 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/92530 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1324759 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:libssp:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-06-07 20:29

Updated : 2024-02-04 19:29


NVD link : CVE-2016-4973

Mitre link : CVE-2016-4973

CVE.ORG link : CVE-2016-4973


JSON object : View

Products Affected

gnu

  • libssp
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer