Vulnerability Details : CVE-2012-2675
Multiple integer overflows in the (1) CallMalloc (malloc) and (2) nedpcalloc (calloc) functions in nedmalloc (nedmalloc.c) before 1.10 beta2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
Products affected by CVE-2012-2675
- cpe:2.3:a:nedprod:nedmalloc:*:beta1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-2675
0.32%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 71 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-2675
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2012-2675
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-2675
-
http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/
Memory allocator security revisited
-
http://www.openwall.com/lists/oss-security/2012/06/05/1
oss-security - memory allocator upstream patches
-
https://github.com/ned14/nedmalloc/commit/1a759756639ab7543b650a10c2d77a0ffc7a2000
Avoid overflowing allocation size in CallMalloc() · ned14/nedmalloc@1a75975 · GitHubExploit;Patch
-
https://github.com/ned14/nedmalloc/commit/2965eca30c408c13473c4146a9d47d547d288db1
Avoid overflowing allocation size in calloc() · ned14/nedmalloc@2965eca · GitHubExploit;Patch
-
http://www.openwall.com/lists/oss-security/2012/06/07/13
oss-security - Re: memory allocator upstream patches
-
https://github.com/ned14/nedmalloc/blob/master/Readme.html
nedmalloc/Readme.html at master · ned14/nedmalloc · GitHub
Jump to