← Retour aux CVEs
CVE-2016-4973
N/ADescription
Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
Details CVE
Score CVSS v3.1N/A
Publie6/7/2017
Derniere modification4/20/2025
Sourcenvd
Observations honeypot0
Produits affectes
gnu:libssp
Faiblesses (CWE)
CWE-119
References
http://www.openwall.com/lists/oss-security/2016/08/17/6(secalert@redhat.com)
http://www.securityfocus.com/bid/92530(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=1324759(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2016/08/17/6(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/92530(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=1324759(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.