Out-of-Bounds Affecting gcc package, versions [0,]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.07% (35th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-GCC-5898488
  • published13 Sept 2023
  • disclosed12 Sept 2023
  • creditTom Hebb, Azeria-labs

Introduced: 12 Sep 2023

CVE-2023-4039  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

There is no fixed version for gcc.

Overview

Affected versions of this package are vulnerable to Out-of-Bounds. On AArch64 targets, GCC's stack smashing protection does not detect or defend against overflows of dynamically sized local variables.

PoC

#include <stdint.h>
#include <stdio.h>
#include <stdlib.h>

int main(int argc, char **argv) {
    if (argc != 2)
        return 1;

    // Variable-length array
    uint8_t input[atoi(argv[1])];

    size_t n = fread(input, 1, 4096, stdin);
    fwrite(input, 1, n, stdout);

    return 0;
}

CVSS Base Scores

version 3.1