Linux Distros Unpatched Vulnerability : CVE-2023-4039

medium Nessus Plugin ID 227324

Synopsis

The Linux/Unix host has one or more packages installed with a vulnerability that the vendor indicates will not be patched.

Description

The Linux/Unix host has one or more packages installed that are impacted by a vulnerability without a vendor supplied patch available.

- **DISPUTED**A failure in the -fstack-protector feature in GCC-based toolchains that target AArch64 allows an attacker to exploit an existing buffer overflow in dynamically-sized local variables in your application without this being detected. This stack-protector failure only applies to C99-style dynamically-sized local variables or those created using alloca(). The stack-protector operates as intended for statically-sized local variables. The default behavior when the stack-protector detects an overflow is to terminate your application, resulting in controlled loss of availability. An attacker who can exploit a buffer overflow without triggering the stack-protector might be able to change program flow control to cause an uncontrolled loss of availability or to go further and affect confidentiality or integrity. NOTE: The GCC project argues that this is a missed hardening bug and not a vulnerability by itself. (CVE-2023-4039)

Note that Nessus relies on the presence of the package as reported by the vendor.

Solution

There is no known solution at this time.

See Also

https://security-tracker.debian.org/tracker/CVE-2023-4039

https://ubuntu.com/security/CVE-2023-4039

Plugin Details

Severity: Medium

ID: 227324

File Name: unpatched_CVE_2023_4039.nasl

Version: 1.3

Type: local

Agent: unix

Family: Misc.

Published: 3/5/2025

Updated: 9/1/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:P

CVSS Score Source: CVE-2023-4039

CVSS v3

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 4.3

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:debian:debian_linux:11.0, cpe:/o:canonical:ubuntu_linux:16.04:-:lts, p-cpe:/a:canonical:ubuntu_linux:gccgo-6, cpe:/o:canonical:ubuntu_linux:24.04:-:lts, p-cpe:/a:debian:debian_linux:gcc-9, p-cpe:/a:canonical:ubuntu_linux:gcc-11-cross, cpe:/o:canonical:ubuntu_linux:25.04, p-cpe:/a:canonical:ubuntu_linux:gcc-4.7, p-cpe:/a:canonical:ubuntu_linux:gcc-4.7-armhf-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-4.8-ppc64el-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-arm-linux-androideabi, p-cpe:/a:canonical:ubuntu_linux:gcc-arm-none-eabi, p-cpe:/a:canonical:ubuntu_linux:gcc-avr, p-cpe:/a:canonical:ubuntu_linux:gcc-h8300-hms, p-cpe:/a:canonical:ubuntu_linux:gcc-i686-linux-android, p-cpe:/a:canonical:ubuntu_linux:gcc-opt, p-cpe:/a:canonical:ubuntu_linux:gcc-snapshot, p-cpe:/a:canonical:ubuntu_linux:gcc-6, p-cpe:/a:canonical:ubuntu_linux:gcc-6-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-6-cross-ports, p-cpe:/a:canonical:ubuntu_linux:gcc-7-cross-ports, p-cpe:/a:canonical:ubuntu_linux:gcc-8-cross-ports, p-cpe:/a:canonical:ubuntu_linux:gcc-4.9-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-5-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-8, p-cpe:/a:canonical:ubuntu_linux:gcc-9, p-cpe:/a:canonical:ubuntu_linux:gcc-9-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-11-cross-mipsen, p-cpe:/a:canonical:ubuntu_linux:gcc-11-cross-ports, p-cpe:/a:canonical:ubuntu_linux:gcc-xtensa-lx106, p-cpe:/a:canonical:ubuntu_linux:gccgo-4.9, cpe:/o:canonical:ubuntu_linux:18.04:-:lts, cpe:/o:canonical:ubuntu_linux:20.04:-:lts, cpe:/o:canonical:ubuntu_linux:14.04:-:lts, cpe:/o:canonical:ubuntu_linux:22.04:-:lts, cpe:/o:debian:debian_linux:12.0, p-cpe:/a:canonical:ubuntu_linux:gcc-5, p-cpe:/a:debian:debian_linux:gcc-10, p-cpe:/a:debian:debian_linux:gcc-11, p-cpe:/a:canonical:ubuntu_linux:gcc-12-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-4.7-armel-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-4.8, p-cpe:/a:canonical:ubuntu_linux:gcc-4.8-arm64-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-4.8-armhf-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-4.8-powerpc-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-4.9, p-cpe:/a:canonical:ubuntu_linux:gcc-m68hc1x, p-cpe:/a:canonical:ubuntu_linux:gcc-mingw-w64, p-cpe:/a:canonical:ubuntu_linux:gcc-msp430, p-cpe:/a:canonical:ubuntu_linux:gcc-7-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-8-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-9-cross-ports, p-cpe:/a:canonical:ubuntu_linux:gcc-5-cross-ports, p-cpe:/a:canonical:ubuntu_linux:gcc-7, p-cpe:/a:canonical:ubuntu_linux:gcc-9-cross-mipsen, p-cpe:/a:canonical:ubuntu_linux:gcc-10-cross, p-cpe:/a:canonical:ubuntu_linux:gcc-10-cross-mipsen, p-cpe:/a:canonical:ubuntu_linux:gcc-10-cross-ports, p-cpe:/a:canonical:ubuntu_linux:gcc-12-cross-mipsen, p-cpe:/a:canonical:ubuntu_linux:gcc-12-cross-ports, p-cpe:/a:canonical:ubuntu_linux:gcc-or1k-elf, p-cpe:/a:canonical:ubuntu_linux:gcc-riscv64-unknown-elf

Required KB Items: Host/local_checks_enabled, Host/cpu, global_settings/vendor_unpatched, Host/OS/identifier

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 9/8/2023

Reference Information

CVE: CVE-2023-4039