Description
Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2012-2659 | Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected. |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T19:42:31.836Z
Reserved: 2012-05-14T00:00:00.000Z
Link: CVE-2012-2677
No data.
Status : Deferred
Published: 2012-07-25T19:55:03.023
Modified: 2025-04-11T00:51:21.963
Link: CVE-2012-2677
OpenCVE Enrichment
No data.
Weaknesses
EUVD