First published: Thu Apr 07 2016(Updated: )
Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Libssp |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-4973 has a severity rating that indicates it could allow local users to perform buffer overflow attacks.
To fix CVE-2016-4973, ensure that your binaries are compiled with updated stack protection settings and consider using the Object Size Checking feature.
CVE-2016-4973 affects binaries compiled using the libssp library in GCC for stack smashing protection.
CVE-2016-4973 can be exploited due to the lack of Object Size Checking, which can lead to buffer overflow vulnerabilities.
CVE-2016-4973 is not a remote vulnerability; it requires local access for exploitation.