Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: redhat

Published: 2012-07-25T19:00:00

Updated: 2021-05-26T09:06:08

Reserved: 2012-05-14T00:00:00


Link: CVE-2012-2677

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2012-07-25T19:55:03.023

Modified: 2021-05-26T10:15:07.797


Link: CVE-2012-2677

JSON object: View

cve-icon Redhat Information

No data.

CWE