Vulnerability identifier: #VU73785
Vulnerability risk: Medium
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-209
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Gnu Compiler Collection
Client/Desktop applications /
Software for system administration
Vendor: GNU
Description
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application in the stack_protect_prologue in cfgexpand.c and stack_protect_epilogue in function.c. A remote attacker can gain unauthorized access to sensitive information on the system.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Gnu Compiler Collection: 4.1.0 - 8.5.0
CPE
External links
http://gcc.gnu.org/viewcvs/gcc/trunk/gcc/config/arm/arm-protos.h?revision=266379&view=markup
http://www.gnu.org/software/gcc/gcc-8/changes.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?