Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1324759 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/92530 | Third Party Advisory VDB Entry |
http://www.openwall.com/lists/oss-security/2016/08/17/6 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2017-06-07 13:29
Updated : 2017-06-15 07:12
NVD link : CVE-2016-4973
Mitre link : CVE-2016-4973
JSON object : View
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
Products Affected
gnu
- libssp