CVE-2013-4788
04.10.2013, 17:55
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | glibc | 𝑥 ≤ 2.17 |
gnu | glibc | 2.0 |
gnu | glibc | 2.0.1 |
gnu | glibc | 2.0.2 |
gnu | glibc | 2.0.3 |
gnu | glibc | 2.0.4 |
gnu | glibc | 2.0.5 |
gnu | glibc | 2.0.6 |
gnu | glibc | 2.1 |
gnu | glibc | 2.1.1 |
gnu | glibc | 2.1.1.6 |
gnu | glibc | 2.1.2 |
gnu | glibc | 2.1.3 |
gnu | glibc | 2.1.9 |
gnu | glibc | 2.4 |
gnu | glibc | 2.10.1 |
gnu | glibc | 2.11 |
gnu | glibc | 2.11.1 |
gnu | glibc | 2.11.2 |
gnu | glibc | 2.11.3 |
gnu | glibc | 2.12.1 |
gnu | glibc | 2.12.2 |
gnu | glibc | 2.13 |
gnu | glibc | 2.14 |
gnu | glibc | 2.14.1 |
gnu | glibc | 2.15 |
gnu | glibc | 2.16 |
gnu | eglibc | * |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References