CVE-2008-1685

gcc 4.2.0 through 4.3.0 in GNU Compiler Collection, when casts are not used, considers the sum of a pointer and an int to be greater than or equal to the pointer, which might lead to removal of length testing code that was intended as a protection mechanism against integer overflow and buffer overflow attacks, and provide no diagnostic message about this removal. NOTE: the vendor has determined that this compiler behavior is correct according to section 6.5.6 of the C99 standard (aka ISO/IEC 9899:1999)
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 64%
VendorProductVersion
gnugcc
4.2.0
gnugcc
4.2.1
gnugcc
4.2.2
gnugcc
4.2.3
gnugcc
4.2.4
gnugcc
4.3.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
gcc-4.2
karmic
ignored
jaunty
ignored
intrepid
ignored
hardy
ignored
gutsy
ignored
feisty
dne
edgy
dne
dapper
dne
gcc-4.3
karmic
ignored
jaunty
ignored
intrepid
ignored
hardy
dne
gutsy
dne
feisty
dne
edgy
dne
dapper
dne