GNU Compiler Collection缓冲区溢出漏洞

漏洞信息详情

GNU Compiler Collection缓冲区溢出漏洞

漏洞简介

当将特定的expr比较合并入对应的offset比较而非EQ_EXPR 和NE_EXPR中时, GNU Compiler Collection (gcc) 4.1版本的fold-const.c中的fold_binary不能正确地处理指针溢出。这可能使得应用程序产生缓冲区溢出漏洞,导致上下文相关攻击者可以调用应用程序。

漏洞公告

参考网址

来源: BUGTRAQ

名称: 20060417 gcc 4.1 bug miscompiles pointer range checks, may place you at risk

链接:http://www.securityfocus.com/archive/1/archive/1/431184/100/0/threaded

来源: BUGTRAQ

名称: 20060418 Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk

链接:http://www.securityfocus.com/archive/1/431319/100/0/threaded

来源: BUGTRAQ

名称: 20060418 Re: gcc 4.1 bug miscompiles pointer range checks, may place you at risk

链接:http://www.securityfocus.com/archive/1/431297/100/0/threaded

来源: gcc.gnu.org

名称: http://gcc.gnu.org/viewcvs/branches/gcc-4_1-branch/gcc/fold-const.c?r1=110549&r2=112698&pathrev=112698&diff_format=h

链接:http://gcc.gnu.org/viewcvs/branches/gcc-4_1-branch/gcc/fold-const.c?r1=110549&r2=112698&pathrev=112698&diff_format=h

来源: MLIST

名称: [gcc-bugs] 20060417 [Bug middle-end/27180] New: pointer arithmetic overflow handling broken

链接:http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01298.html

来源: MLIST

名称: [gcc-bugs] 20060417 [Bug c/27180] New: pointer arithmetic overflow handling broken

链接:http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01297.html

来源: gcc.gnu.org

链接:http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763

来源: MISC

链接:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356896

来源: BUGTRAQ

名称: 20060418 RE: gcc 4.1 bug miscompiles pointer range checks, may place you at risk

链接:http://www.securityfocus.com/archive/1/archive/1/431245/100/0/threaded

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享