CVE-2013-4788

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:gnu:eglibc:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:56

Type Values Removed Values Added
References () http://hmarco.org/bugs/CVE-2013-4788.html - Exploit, Patch () http://hmarco.org/bugs/CVE-2013-4788.html - Exploit, Patch
References () http://seclists.org/fulldisclosure/2015/Sep/23 - () http://seclists.org/fulldisclosure/2015/Sep/23 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2013:284 - () http://www.mandriva.com/security/advisories?name=MDVSA-2013:284 -
References () http://www.openwall.com/lists/oss-security/2013/07/15/9 - Exploit, Patch () http://www.openwall.com/lists/oss-security/2013/07/15/9 - Exploit, Patch
References () http://www.securityfocus.com/bid/61183 - () http://www.securityfocus.com/bid/61183 -
References () https://security.gentoo.org/glsa/201503-04 - () https://security.gentoo.org/glsa/201503-04 -

Information

Published : 2013-10-04 17:55

Updated : 2024-11-21 01:56


NVD link : CVE-2013-4788

Mitre link : CVE-2013-4788

CVE.ORG link : CVE-2013-4788


JSON object : View

Products Affected

gnu

  • glibc
  • eglibc
CWE
CWE-20

Improper Input Validation