Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-1685

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2008-1685
Last Modified 29 Oct 2012 11:09:52
Published 06 Apr 2008 07:44:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2008-1685

Summary

** DISPUTED ** gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999).

Vulnerable Systems

Application

  • Gnu Gcc 4.2.0

  • Gnu Gcc 4.2.1

  • Gnu Gcc 4.2.2

  • Gnu Gcc 4.2.3

  • Gnu Gcc 4.2.4

  • Gnu Gcc 4.3.0


References

CERT-VN - VU#162289

MISC - http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763

XF - gcc-weak-security(41686)


Last Updated: 27 May 2016 10:49:44