CVE-2013-4788
04.10.2013, 17:55
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.Enginsight
| Vendor | Product | Version |
|---|---|---|
| gnu | glibc | 𝑥 ≤ 2.17 |
| gnu | glibc | 2.0 |
| gnu | glibc | 2.0.1 |
| gnu | glibc | 2.0.2 |
| gnu | glibc | 2.0.3 |
| gnu | glibc | 2.0.4 |
| gnu | glibc | 2.0.5 |
| gnu | glibc | 2.0.6 |
| gnu | glibc | 2.1 |
| gnu | glibc | 2.1.1 |
| gnu | glibc | 2.1.1.6 |
| gnu | glibc | 2.1.2 |
| gnu | glibc | 2.1.3 |
| gnu | glibc | 2.1.9 |
| gnu | glibc | 2.4 |
| gnu | glibc | 2.10.1 |
| gnu | glibc | 2.11 |
| gnu | glibc | 2.11.1 |
| gnu | glibc | 2.11.2 |
| gnu | glibc | 2.11.3 |
| gnu | glibc | 2.12.1 |
| gnu | glibc | 2.12.2 |
| gnu | glibc | 2.13 |
| gnu | glibc | 2.14 |
| gnu | glibc | 2.14.1 |
| gnu | glibc | 2.15 |
| gnu | glibc | 2.16 |
| gnu | eglibc | * |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
References