Vulnerability Details : CVE-2016-6323
The makecontext function in the GNU C Library (aka glibc or libc6) before 2.25 creates execution contexts incompatible with the unwinder on ARM EABI (32-bit) platforms, which might allow context-dependent attackers to cause a denial of service (hang), as demonstrated by applications compiled using gccgo, related to backtrace generation.
Vulnerability category: BypassGain privilegeDenial of service
Products affected by CVE-2016-6323
- cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
- cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-6323
1.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-6323
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST | |
7.5
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
3.9
|
3.6
|
NIST |
CWE ids for CVE-2016-6323
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-6323
-
http://www.openwall.com/lists/oss-security/2016/08/18/12
oss-security - CVE-2016-6323: Missing unwind information on ARM EABI (32-bit) causes backtrace generation to hangMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-updates/2016-10/msg00009.html
openSUSE-SU-2016:2443-1: moderate: Security update for glibcThird Party Advisory
-
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9e2ff6c9cc54c0b4402b8d49e4abe7000fde7617
sourceware.org Git - glibc.git/commitIssue Tracking;Patch
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WO7IMEYWZ2WTXGGMZBWWSDCUMFN63XOB/
[SECURITY] Fedora 23 Update: glibc-2.22-18.fc23 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21995039
IBM notice: The page you requested cannot be displayed
-
https://security.gentoo.org/glsa/201706-19
GNU C Library: Multiple vulnerabilities (GLSA 201706-19) — Gentoo security
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KTXSOVCRDGBIB4WCIDAGYYUBESXZ4IGK/
[SECURITY] Fedora 24 Update: glibc-2.23.1-10.fc24 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://www.securityfocus.com/bid/92532
GNU glibc CVE-2016-6323 Infinite Loop Denial of Service Vulnerability
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LVWSAZVBTLALXF4SCBPDV3FY6J22DXLZ/
[SECURITY] Fedora 25 Update: glibc-2.24-3.fc25 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://sourceware.org/bugzilla/show_bug.cgi?id=20435
20435 – (CVE-2016-6323) Missing unwind info in __startcontext causes infinite loop in _Unwind_Backtrace (CVE-2016-6323)Issue Tracking
Jump to