← Back to CVEs
CVE-2016-4973
N/ADescription
Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
CVE Details
CVSS v3.1 ScoreN/A
Published6/7/2017
Last Modified4/20/2025
Sourcenvd
Honeypot Sightings0
Affected Products
gnu:libssp
Weaknesses (CWE)
CWE-119
References
http://www.openwall.com/lists/oss-security/2016/08/17/6(secalert@redhat.com)
http://www.securityfocus.com/bid/92530(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1324759(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/08/17/6(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/92530(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1324759(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.