First published: Sun Apr 06 2008(Updated: )
** DISPUTED ** gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
GNU Compiler Collection | =4.2.4 | |
GNU Compiler Collection | =4.2.0 | |
GNU Compiler Collection | =4.2.1 | |
GNU Compiler Collection | =4.2.3 | |
GNU Compiler Collection | =4.3.0 | |
GNU Compiler Collection | =4.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1685 is considered a medium severity vulnerability due to its potential impact on integer overflow protection in GCC.
To fix CVE-2008-1685, upgrade to a patched version of GCC, specifically 4.3.1 or later.
CVE-2008-1685 affects GCC versions 4.2.0 through 4.3.0.
CVE-2008-1685 is a type of integer overflow vulnerability caused by improper handling of pointer arithmetic.
CVE-2008-1685 is disputed; however, it has been acknowledged as a potential issue within the affected versions.