22 Mai 2019
Vulnérabilité CVE-2018-12886 CVE Vulnerability
stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against. (CVSS:0.0) (Last Update:2019-05-22)
Vulnerability Details : stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against. Publish Date : 2019-05-22 Last Update Date : 2019-05-22 - CVSS Scores & Vulnerability Types
- Products Affected By CVE-2018-12886
- References For CVE-2018-12886
| |||||||||||||||||||||||||||||||||||||||||||||||
- Metasploit Modules Related To CVE-2018-12886There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information) |