Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-1685


Vulnerability Score 6.8 6.8
CVE Id CVE-2008-1685
Last Modified 29 Oct 2012 11:09:52
Published 06 Apr 2008 07:44:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE



** DISPUTED ** gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999).

Vulnerable Systems


  • Gnu Gcc 4.2.0

  • Gnu Gcc 4.2.1

  • Gnu Gcc 4.2.2

  • Gnu Gcc 4.2.3

  • Gnu Gcc 4.2.4

  • Gnu Gcc 4.3.0


CERT-VN - VU#162289


XF - gcc-weak-security(41686)

Last Updated: 27 May 2016 10:49:44