Multiple integer overflows in the (1) CallMalloc (malloc) and (2) nedpcalloc (calloc) functions in nedmalloc (nedmalloc.c) before 1.10 beta2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
References
Configurations
History
21 Nov 2024, 01:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/ - | |
References | () http://www.openwall.com/lists/oss-security/2012/06/05/1 - | |
References | () http://www.openwall.com/lists/oss-security/2012/06/07/13 - | |
References | () https://github.com/ned14/nedmalloc/blob/master/Readme.html - | |
References | () https://github.com/ned14/nedmalloc/commit/1a759756639ab7543b650a10c2d77a0ffc7a2000 - Exploit, Patch | |
References | () https://github.com/ned14/nedmalloc/commit/2965eca30c408c13473c4146a9d47d547d288db1 - Exploit, Patch |
Information
Published : 2012-07-25 19:55
Updated : 2024-11-21 01:39
NVD link : CVE-2012-2675
Mitre link : CVE-2012-2675
CVE.ORG link : CVE-2012-2675
JSON object : View
Products Affected
nedprod
- nedmalloc
CWE
CWE-189
Numeric Errors