Vulnerability Details : CVE-2006-1902
fold_binary in fold-const.c in GNU Compiler Collection (gcc) 4.1 improperly handles pointer overflow when folding a certain expr comparison to a corresponding offset comparison in cases other than EQ_EXPR and NE_EXPR, which might introduce buffer overflow vulnerabilities into applications that could be exploited by context-dependent attackers.NOTE: the vendor states that the essence of the issue is "not correctly interpreting an offset to a pointer as a signed value."
Vulnerability category: Overflow
Exploit prediction scoring system (EPSS) score for CVE-2006-1902
Probability of exploitation activity in the next 30 days: 0.06%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 24 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2006-1902
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |
3.9
|
2.9
|
NIST |
CWE ids for CVE-2006-1902
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-1902
-
http://www.securityfocus.com/archive/1/431184/100/0/threaded
-
http://gcc.gnu.org/viewcvs/branches/gcc-4_1-branch/gcc/fold-const.c?r1=110549&r2=112698&pathrev=112698&diff_format=h
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=356896
-
http://www.securityfocus.com/archive/1/431319/100/0/threaded
-
http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01297.html
-
http://www.securityfocus.com/archive/1/431245/100/0/threaded
-
http://gcc.gnu.org/ml/gcc-bugs/2006-04/msg01298.html
-
http://www.securityfocus.com/archive/1/431297/100/0/threaded
-
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=26763
26763 – [4.1/4.2 Regression] wrong final value of induction variable calculated
Products affected by CVE-2006-1902
- cpe:2.3:a:gnu:gcc:4.1:*:*:*:*:*:*:*