The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and previous versions, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent malicious users to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
gnu glibc |
||
gnu glibc 2.11.3 |
||
gnu glibc 2.11.2 |
||
gnu glibc 2.1.1.6 |
||
gnu glibc 2.1.1 |
||
gnu glibc 2.0.1 |
||
gnu glibc 2.0 |
||
gnu glibc 2.14.1 |
||
gnu glibc 2.14 |
||
gnu glibc 2.10.1 |
||
gnu glibc 2.1.9 |
||
gnu glibc 2.0.5 |
||
gnu glibc 2.0.4 |
||
gnu glibc 2.13 |
||
gnu glibc 2.12.2 |
||
gnu glibc 2.12.1 |
||
gnu glibc 2.1.3 |
||
gnu glibc 2.1.2 |
||
gnu glibc 2.0.3 |
||
gnu glibc 2.0.2 |
||
gnu glibc 2.16 |
||
gnu glibc 2.15 |
||
gnu glibc 2.11.1 |
||
gnu glibc 2.11 |
||
gnu glibc 2.1 |
||
gnu glibc 2.0.6 |
||
gnu glibc 2.4 |
||
gnu eglibc |