Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T00:46:39.910Z

Reserved: 2016-05-24T00:00:00

Link: CVE-2016-4973

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-06-07T20:29:00.443

Modified: 2025-04-20T01:37:25.860

Link: CVE-2016-4973

cve-icon Redhat

Severity : Moderate

Publid Date: 2016-08-17T00:00:00Z

Links: CVE-2016-4973 - Bugzilla

cve-icon OpenCVE Enrichment

No data.