CVE-2016-4973

NameCVE-2016-4973
DescriptionBinaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: local)
Debian Bugs848704

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gcc-4.9 (PTS)jessie4.9.2-10fixed
gcc-5 (PTS)sid5.5.0-6fixed
gcc-6 (PTS)stretch6.3.0-18fixed
buster, sid6.4.0-11fixed
gcc-mingw-w64 (PTS)wheezy8vulnerable
jessie14.3vulnerable
stretch19.3vulnerable
buster, sid20vulnerable
mingw32 (PTS)wheezy4.2.1.dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gcc-4.9source(unstable)(not affected)
gcc-5source(unstable)(not affected)
gcc-6source(unstable)(not affected)
gcc-mingw-w64source(unstable)(unfixed)unimportant848704
mingw32source(unstable)(unfixed)medium

Notes

https://bugzilla.redhat.com/show_bug.cgi?id=1324759
- gcc-6 <not-affected> (Uses glibc-internal SSP)
- gcc-5 <not-affected> (Uses glibc-internal SSP)
- gcc-4.9 <not-affected> (Uses glibc-internal SSP)
[wheezy] - mingw32 <no-dsa> (Minor issue)
Missing security feature, not a direct vulnerability

Search for package or bug name: Reporting problems