260 – Insecure Binary compilation
Description
The binary for the IOS platform has been compiled without the Stack Smashing Protector (SSP) and Automatic Reference Counting (ARC) flags which provide protection against Stack Overflow attacks and memory corruption.
Impact
Overwrite registers in memory or cause a denial of service through buffer overflow attacks.
Recommendation
Compile binaries with ARC and fstack-protector-all flags.
Threat
Internal attacker with access to the IPA.
Expected Remediation Time
Score 4.0
Default score using CVSS 4.0. It may change depending on the context of the src.
Base 4.0
- Attack vector: A
- Attack complexity: H
- Attack Requirements: N
- Privileges required: L
- User interaction: N
- Confidentiality (VC): N
- Integrity (VI): L
- Availability (VA): L
- Confidentiality (SC): N
- Integrity (SI): N
- Availability (SA): N
Threat 4.0
- Exploit maturity: P