Integer overflow in the calloc function in libc/stdlib/malloc.c in jemalloc in libc for FreeBSD 6.4 and NetBSD makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which triggers a memory allocation of one byte.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/ - | |
References | () http://svnweb.freebsd.org/base?view=revision&revision=161263 - Patch |
Information
Published : 2012-07-25 19:55
Updated : 2024-11-21 00:24
NVD link : CVE-2006-7252
Mitre link : CVE-2006-7252
CVE.ORG link : CVE-2006-7252
JSON object : View
Products Affected
netbsd
- netbsd
freebsd
- freebsd
CWE
CWE-189
Numeric Errors