In the __multadd function of the newlib libc library, prior to versions 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate a big integer, however no check is performed to verify if the allocation succeeded or not. This will trigger a null pointer dereference bug in case of a memory allocation failure.
References
Link | Resource |
---|---|
https://census-labs.com/news/2020/01/31/multiple-null-pointer-dereference-vulnerabilities-in-newlib/ | Exploit Third Party Advisory |
https://census-labs.com/news/2020/01/31/multiple-null-pointer-dereference-vulnerabilities-in-newlib/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://census-labs.com/news/2020/01/31/multiple-null-pointer-dereference-vulnerabilities-in-newlib/ - Exploit, Third Party Advisory |
Information
Published : 2020-03-19 16:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14873
Mitre link : CVE-2019-14873
CVE.ORG link : CVE-2019-14873
JSON object : View
Products Affected
newlib_project
- newlib
CWE
CWE-476
NULL Pointer Dereference