Stack Overflow Bypass in GNU Compiler Collection for ARM Targets
CVE-2018-12886

8.1HIGH

Key Information:

Vendor
Gnu
Status
Vendor
CVE Published:
22 May 2019

Summary

The GNU Compiler Collection (GCC) versions 4.1 through 8, when targeting ARM architectures, may generate flawed instruction sequences in specific circumstances. This can result in the spilling of the stack protector guard address, enabling a malicious actor to bypass various stack protection features such as -fstack-protector, -fstack-protector-all, -fstack-protector-strong, and -fstack-protector-explicit. Consequently, this weakness can lead to potential exploitation through crafted inputs that manipulate the expected operation of the stack canary.

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.