Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by a setuid program that contains a stack-based buffer overflow error, related to the __fortify_fail function in debug/fortify_fail.c, and the __stack_chk_fail (aka stack protection) and __chk_fail (aka FORTIFY_SOURCE) implementations.
References
Configurations
History
No history.
Information
Published : 2010-10-14 05:58
Updated : 2025-04-11 00:51
NVD link : CVE-2010-3192
Mitre link : CVE-2010-3192
CVE.ORG link : CVE-2010-3192
JSON object : View
Products Affected
gnu
- glibc
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor