Lucene search

K
redhatcveRedhat.comRH:CVE-2016-4973
HistoryAug 18, 2016 - 9:04 p.m.

CVE-2016-4973

2016-08-1821:04:37
redhat.com
access.redhat.com
13

0.0004 Low

EPSS

Percentile

5.1%

It was found that targets using gcc’s libssp library for Stack Smashing Protection (among others: Cygwin, MinGW, newlib, RTEMS; but not Glibc, Bionic, NetBSD which provide SSP in libc), are missing the Object Size Checking feature, even when explicitly requested with _FORTIFY_SOURCE. Vulnerable binaries compiled against such targets do not benefit of such protection, increasing the chances of success of a buffer overflow attack.

0.0004 Low

EPSS

Percentile

5.1%

Related for RH:CVE-2016-4973