CVE-2010-3192

Impact:
Low
Public Date:
2010-04-27
Bugzilla:
643396: CVE-2010-3192 glibc: __fortify_fail may use corrupted memory when called from SSP callback

The MITRE CVE dictionary describes this issue as:

Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.

Find out more about CVE-2010-3192 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

The Red Hat Security Response Team has rated this issue as having low security
impact. We do not currently plan to fix this flaw. If more information becomes available at a future date, we may revisit the issue.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 2.1
Base Metrics AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.