First published: Thu Apr 20 2006(Updated: )
fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Compiler Collection (GCC) | =4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-1902 is considered a moderate severity vulnerability due to the potential for buffer overflow issues.
To fix CVE-2006-1902, you should upgrade to a more recent version of the GNU Compiler Collection, as version 4.1 is affected.
CVE-2006-1902 specifically affects version 4.1 of the GNU Compiler Collection (GCC).
Exploitation of CVE-2006-1902 may lead to buffer overflow vulnerabilities, potentially allowing arbitrary code execution.
CVE-2006-1902 was reported in 2006, highlighting issues present in the GNU Compiler Collection.