logo

260 Insecure Binary compilation


Description

The binary for the IOS platform has been compiled without the Stack Smashing Protector (SSP) and Automatic Reference Counting (ARC) flags which provide protection against Stack Overflow attacks and memory corruption.


Impact

Overwrite registers in memory or cause a denial of service through buffer overflow attacks.


Recommendation

Compile binaries with ARC and fstack-protector-all flags.


Threat

Internal attacker with access to the IPA.


Expected Remediation Time

450 minutes.


Score 4.0

Default score using CVSS 4.0. It may change depending on the context of the src.

Base 4.0

  • Attack vector: A
  • Attack complexity: H
  • Attack Requirements: N
  • Privileges required: L
  • User interaction: N
  • Confidentiality (VC): N
  • Integrity (VI): L
  • Availability (VA): L
  • Confidentiality (SC): N
  • Integrity (SI): N
  • Availability (SA): N

Threat 4.0

  • Exploit maturity: P

Requirements


Last updated

2024/02/18