Page 3 of 14 results (0.006 seconds)

CVSS: 6.8EPSS: 0%CPEs: 6EXPL: 0

gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999) ** DISPUTED ** gcc de 4.2.0 a 4.3.0 en GNU Compiler Collection, cuando casts no están utilizados, considera que la suma de un puntero y un entero es mayor o igual que el puntero, lo que podría llevar a la eliminación del código de comprobación de longitud que estaba previsto como un mecanismo de protección contra ataques de desbordamientos de enteros y desbordamiento de búfer, y no proporcionar un mensaje diagnóstico sobre esta eliminación. NOTA: el proveedor ha determinado que este comportamiento del compilador es correcto según la sección 6.5.6 de la norma C99 (también conocido como ISO/IEC 9899:1999). • http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763 http://www.kb.cert.org/vuls/id/162289 https://exchange.xforce.ibmcloud.com/vulnerabilities/41686 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-189: Numeric Errors •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 1

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI conventions and cause data to be copied in the wrong direction during signal handling in the Linux kernel, which might allow context-dependent attackers to trigger memory corruption. NOTE: this issue was originally reported for CPU consumption in SBCL. gcc 4.3.x no genera una instrucción cld mientras compila funciones usadas por cadenas manipuladas como memcpy y memmove en x86 y i386, lo que puede prevenir que el indicador de dirección (DF) sea reseteado en violación de las convenciones ABI y cause que datos sean copiados en la dirección equivocada durante el manejo de señales en el Kernel de Linux, lo que puede permitir a atacantes remotos dependiendo del contexto provocar corrupciones de memoria. NOTA: Originalmente reportada como consumo de CPU en SBCL • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469058 http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00417.html http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00428.html http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00432.html http://gcc.gnu.org/ml/gcc-patches/2008-03/msg00499.html http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e40cd10ccff3d9fbffd57b93780bee4b7b9bff51 http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html& • CWE-399: Resource Management Errors •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value." • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356896 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763 http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01297.html http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01298.html http://gcc.gnu.org/viewcvs/branches/gcc-4_1-branch/gcc/fold-const.c?r1=110549&r2=112698&pathrev=112698&diff_format=h http://www.securityfocus.com/archive/1/431184/100/0/threaded http://www.securityfocus.com/archive/1/431245/100/0/threaded http:& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

The -ftrapv compiler option in gcc and g++ 3.3.3 and earlier does not handle all types of integer overflows, which may leave applications vulnerable to vulnerabilities related to overflows. • http://gcc.gnu.org/ml/gcc-bugs/2002-05/msg00198.html http://www.kb.cert.org/vuls/id/540517 •