CVE-2016-4973

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1324759 Issue Tracking Third Party Advisory
http://www.securityfocus.com/bid/92530 Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2016/08/17/6 Mailing List Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:gnu:libssp:-:*:*:*:*:*:*:*

Information

Published : 2017-06-07 13:29

Updated : 2017-06-15 07:12


NVD link : CVE-2016-4973

Mitre link : CVE-2016-4973


JSON object : View

CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

Advertisement

dedicated server usa

Products Affected

gnu

  • libssp