In the __mdiff function of the newlib libc library, all versions prior to 3.3.0 (see newlib/libc/stdlib/mprec.c), Balloc is used to allocate big integers, however no check is performed to verify if the allocation succeeded or not. The access to _wds and _sign will trigger a null pointer dereference bug in case of a memory allocation failure.
References
Link | Resource |
---|---|
https://census-labs.com/news/2020/01/31/multiple-null-pointer-dereference-vulnerabilities-in-newlib/ | Exploit Third Party Advisory |
https://census-labs.com/news/2020/01/31/multiple-null-pointer-dereference-vulnerabilities-in-newlib/ | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://census-labs.com/news/2020/01/31/multiple-null-pointer-dereference-vulnerabilities-in-newlib/ - Exploit, Third Party Advisory |
Information
Published : 2020-03-19 16:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14877
Mitre link : CVE-2019-14877
CVE.ORG link : CVE-2019-14877
JSON object : View
Products Affected
newlib_project
- newlib
CWE
CWE-476
NULL Pointer Dereference