Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2012-07-25T19:00:00

Updated: 2024-08-06T19:42:31.836Z

Reserved: 2012-05-14T00:00:00

Link: CVE-2012-2677

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2012-07-25T19:55:03.023

Modified: 2024-11-21T01:39:25.650

Link: CVE-2012-2677

cve-icon Redhat

Severity : Moderate

Publid Date: 2012-06-05T00:00:00Z

Links: CVE-2012-2677 - Bugzilla