CVE-2016-4973

Source
https://nvd.nist.gov/vuln/detail/CVE-2016-4973
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-4973.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2016-4973
Related
Published
2017-06-07T20:29:00Z
Modified
2025-01-14T06:35:51.096092Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.

References

Affected packages

Debian:11 / gcc-mingw-w64

Package

Name
gcc-mingw-w64
Purl
pkg:deb/debian/gcc-mingw-w64?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

24.*

24.2
24.3
24.4

Other

25
26
27~exp1
27~exp2
27~exp3
27~exp4
27~exp5
27~exp6
27~exp7
27~exp8

25.*

25.1
25.2
25.3

26.*

26.1
26.3
26.4
26.5
26.6

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:12 / gcc-mingw-w64

Package

Name
gcc-mingw-w64
Purl
pkg:deb/debian/gcc-mingw-w64?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

25.*

25.2
25.3

Other

26
27~exp1
27~exp2
27~exp3
27~exp4
27~exp5
27~exp6
27~exp7
27~exp8

26.*

26.1
26.3
26.4
26.5
26.6

Ecosystem specific

{
    "urgency": "unimportant"
}

Debian:13 / gcc-mingw-w64

Package

Name
gcc-mingw-w64
Purl
pkg:deb/debian/gcc-mingw-w64?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

25.*

25.2
25.3

Other

26
27~exp1
27~exp2
27~exp3
27~exp4
27~exp5
27~exp6
27~exp7
27~exp8

26.*

26.1
26.3
26.4
26.5
26.6

Ecosystem specific

{
    "urgency": "unimportant"
}