CVE-2018-12886

Related Vulnerabilities: CVE-2018-12886  

Impact: Moderate Public Date: 2019-05-22 CWE: CWE-119 Bugzilla: 1715823: CVE-2018-12886 gcc: spilling of stack protection address in cfgexpand.c and function.c leads to stack-overflow protection bypass stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

The MITRE CVE dictionary describes this issue as:

stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c in GNU Compiler Collection (GCC) 4.1 through 8 (under certain circumstances) generate instruction sequences when targeting ARM targets that spill the address of the stack protector guard, which allows an attacker to bypass the protection of -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit against stack overflow by controlling what the stack canary is compared against.

Find out more about CVE-2018-12886 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 6.8
CVSS3 Base Metrics CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
Attack Vector Local
Attack Complexity Low
Privileges Required None
User Interaction None
Scope Unchanged
Confidentiality Low
Integrity Impact None
Availability Impact High

Affected Packages State

Platform Package State
Red Hat Virtualization 4 gcc Under investigation
Red Hat Enterprise Linux 8 gcc Under investigation
Red Hat Enterprise Linux 7 gcc Under investigation
Red Hat Enterprise Linux 6 gcc Under investigation
Red Hat Enterprise Linux 5 gcc Under investigation
Red Hat Enterprise Linux 5 gcc44 Under investigation
Red Hat Enterprise Linux 4 gcc Under investigation
Red Hat Enterprise Linux 4 gcc4 Under investigation