fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value."
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value."
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/431297/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763 | x_refsource_CONFIRM |
http://www.securityfocus.com/archive/1/431245/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://www.securityfocus.com/archive/1/431319/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356896 | x_refsource_MISC |
http://www.securityfocus.com/archive/1/431184/100/0/threaded | mailing-list x_refsource_BUGTRAQ |
http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01297.html | mailing-list x_refsource_MLIST |
http://gcc.gnu.org/viewcvs/branches/gcc-4_1-branch/gcc/fold-const.c?r1=110549&r2=112698&pathrev=112698&diff_format=h | x_refsource_CONFIRM |
http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01298.html | mailing-list x_refsource_MLIST |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.securityfocus.com/archive/1/431297/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763 | x_refsource_CONFIRM x_transferred |
http://www.securityfocus.com/archive/1/431245/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://www.securityfocus.com/archive/1/431319/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356896 | x_refsource_MISC x_transferred |
http://www.securityfocus.com/archive/1/431184/100/0/threaded | mailing-list x_refsource_BUGTRAQ x_transferred |
http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01297.html | mailing-list x_refsource_MLIST x_transferred |
http://gcc.gnu.org/viewcvs/branches/gcc-4_1-branch/gcc/fold-const.c?r1=110549&r2=112698&pathrev=112698&diff_format=h | x_refsource_CONFIRM x_transferred |
http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01298.html | mailing-list x_refsource_MLIST x_transferred |
fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value."
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 2.1 | LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |