Overview
The BSD libc library's link_ntoa() function may be vulnerable to a classic buffer overflow. It is currently unclear if this issue is exploitable.
Description
CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') - CVE-2016-6559 Improper bounds checking of the obuf variable in the link_ntoa() function in linkaddr.c may allow an attacker to read or write from memory. |
Impact
The full impact and severity depends on the method of exploit and how the library is used by applications. An attacker may be able to execute arbitrary code, but CERT/CC is currently unaware of a proof of concept. |
Solution
Apply an update |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | 9.3 | AV:N/AC:M/Au:N/C:C/I:C/A:C |
Temporal | 6.9 | E:U/RL:OF/RC:C |
Environmental | 1.7 | CDP:ND/TD:L/CR:ND/IR:ND/AR:ND |
References
Acknowledgements
Thanks to the reporter who wishes to remain anonymous.
This document was written by Garret Wassermann.
Other Information
CVE IDs: | CVE-2016-6559 |
Date Public: | 2016-12-06 |
Date First Published: | 2016-12-06 |
Date Last Updated: | 2016-12-08 22:54 UTC |
Document Revision: | 54 |