CVE-2008-1685

** DISPUTED ** gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999).
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:gnu:gcc:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:4.2.4:*:*:*:*:*:*:*
cpe:2.3:a:gnu:gcc:4.2.0:*:*:*:*:*:*:*

Information

Published : 2008-04-06 16:44

Updated : 2017-08-07 18:30


NVD link : CVE-2008-1685

Mitre link : CVE-2008-1685


JSON object : View

CWE
CWE-189

Numeric Errors

CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

Advertisement

dedicated server usa

Products Affected

gnu

  • gcc