Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2013-4788 — Improper Input Validation in Glibc
Severity
5.1MEDIUMNVD
EPSS
7.6%
top 8.15%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 4
Latest updateMay 17
Description
The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2.4, 2.17, and earlier, and Embedded GLIBC (EGLIBC) does not initialize the random value for the pointer guard, which makes it easier for context-dependent attackers to control execution flow by leveraging a buffer-overflow vulnerability in an application and using the known zero value pointer guard to calculate a pointer address.
CVSS vector
AV:N/AC:H/C:P/I:P/A:PExploitability: 4.9 | Impact: 6.4
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-xh2f-h76w-4qqc: The PTR_MANGLE implementation in the GNU C Library (aka glibc or libc6) 2↗2022-05-17
CVEList
▶
OSV
▶
💥Exploits & PoCs
1📋Vendor Advisories
2💬Community
3Bugzilla▶
glibc: Bypass the pointer guarding protection on set-user-ID and set-group-ID executables (PTR_MANGLE)↗2016-01-19
Bugzilla▶
glibc: CVE-2013-4788 glibc: PTR_MANGLE does not initialize to a random value for the pointer guard when compiling static executables [fedora-all]↗2013-07-31
Bugzilla▶
CVE-2013-4788 glibc: PTR_MANGLE does not initialize to a random value for the pointer guard when compiling static executables↗2013-07-17