CWE
693
Advisory Published
Updated

CVE-2023-4039: GCC's-fstack-protector fails to guard dynamically-sized local variables on AArch64

First published: Wed Sep 13 2023(Updated: )

**DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself.

Credit: arm-security@arm.com arm-security@arm.com

Affected SoftwareAffected VersionHow to fix
GNU GCC<2023-09-12

Remedy

Recompile vulnerable code using an updated toolchain.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-4039?

    CVE-2023-4039 is a vulnerability that affects GCC-based toolchains targeting AArch64, allowing an attacker to exploit buffer overflows in dynamically-sized local variables.

  • What does the -fstack-protector feature in GCC-based toolchains do?

    The -fstack-protector feature in GCC-based toolchains provides protection against stack buffer overflows by adding canaries, or integrity checks, to the stack.

  • What is the impact of CVE-2023-4039?

    The impact of CVE-2023-4039 is that an attacker can exploit buffer overflows in dynamically-sized local variables without detection.

  • How can I protect my application from CVE-2023-4039?

    To protect your application from CVE-2023-4039, make sure to update your GCC-based toolchain to a version that includes the fix for this vulnerability.

  • Where can I find more information about CVE-2023-4039?

    You can find more information about CVE-2023-4039 on the Arm Security Center website and the GitHub Advisory database.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203