Computer Security
[EN] securityvulns.ru no-pyccku


libgc integer overflows
Published:29.08.2012
Source:
SecurityVulns ID:12549
Type:library
Threat Level:
6/10
Description:Multiple integer overflows in malloc / calloc implementations.
Affected:LIBGC : libgc 7.1
CVE:CVE-2012-2673 (Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc funtions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod