#VU110118 Input validation error in Glibc - CVE-2013-4788

 

#VU110118 Input validation error in Glibc - CVE-2013-4788

Published: July 1, 2017 / Updated: June 3, 2025


Vulnerability identifier: #VU110118
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/U:Green
CVE-ID: CVE-2013-4788
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: Public exploit is available
Vulnerable software:
Glibc
Software vendor:
GNU

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address. Additional information that was taken into consideration while scoring: https://bugzilla.redhat.com/show_bug.cgi?id=985625


Remediation

Install update from vendor's website.

External links