Page 2 of 11 results (0.003 seconds)

CVSS: 9.8EPSS: 3%CPEs: 28EXPL: 4

16 Jul 2013 — The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address. La implementación PTR_MANGLE en la GNU C Library (librería también conocida como glibc o libc6) 2.4, 2.17 y... • http://hmarco.org/bugs/CVE-2013-4788.html • CWE-20: Improper Input Validation •