ID |
CVE-2018-12886
|
Sažetak |
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against. |
Reference |
|
CVSS |
Base: | 6.8 |
Impact: | 6.4 |
Exploitability: | 8.6 |
|
Pristup |
Vektor | Složenost | Autentikacija |
NETWORK |
MEDIUM |
NONE |
|
Impact |
Povjerljivost | Cjelovitost | Dostupnost |
PARTIAL |
PARTIAL |
PARTIAL |
|
CVSS vektor |
AV:N/AC:M/Au:N/C:P/I:P/A:P |
Zadnje važnije ažuriranje |
24-08-2020 - 17:37 |
Objavljeno |
22-05-2019 - 19:29 |