Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2002-2439

Опубликовано: 23 окт. 2019
Источник: debian
EPSS Низкий

Описание

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
gcc-4.1removedpackage
gcc-4.1no-dsasqueezepackage
gcc-4.3removedpackage
gcc-4.3no-dsasqueezepackage
gcc-4.4unfixedpackage
gcc-4.4no-dsasqueezepackage
gcc-4.4no-dsawheezypackage
gcc-4.6unfixedpackage
gcc-4.6no-dsawheezypackage
gcc-4.7removedpackage
gcc-4.7no-dsawheezypackage
gcc-4.8fixed4.8.0-1package

Примечания

  • Are there apps known to be exploitable through this?

  • Any application using unguarded memory allocation would be susceptible to DoS anyway?

  • This should be addressed in jessie by getting this fixed in gcc 4.7, so that the archive is

  • properly rebuild with a fixed version from the start

  • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2002-2439

EPSS

Процентиль: 30%
0.00106
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 5 лет назад

operator new[] sometimes returns pointers to heap blocks which are too small. When a new array is allocated, the C++ run-time has to calculate its size. The product may exceed the maximum value which can be stored in a machine register. This error is ignored, and the truncated value is used for the heap allocation. This may lead to heap overflows and therefore security bugs. (See http://cert.uni-stuttgart.de/advisories/calloc.php for further references.)

redhat
почти 23 года назад

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

CVSS3: 7.8
nvd
больше 5 лет назад

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

CVSS3: 7.8
github
около 3 лет назад

Integer overflow in the new[] operator in gcc before 4.8.0 allows attackers to have unspecified impacts.

EPSS

Процентиль: 30%
0.00106
Низкий