CVE-2012-2677
Summary
| CVE | CVE-2012-2677 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2012-07-25 19:55:03 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
PartialAV:N/AC:L/Au:N/C:N/I:N/A:P
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - memory allocator upstream patches | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| oss-security - Re: memory allocator upstream patches | af854a3a-2127-422b-91ae-364da2661108 | www.openwall.com | |
| Boost: Buffer overflow (GLSA 202105-04) — Gentoo security | af854a3a-2127-422b-91ae-364da2661108 | security.gentoo.org | |
| #6701 (integer overflows in ordered_malloc()) – Boost C++ Libraries | af854a3a-2127-422b-91ae-364da2661108 | svn.boost.org | |
| [SECURITY] Fedora 17 Update: boost-1.48.0-13.fc17 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Changeset 78326 – Boost C++ Libraries | af854a3a-2127-422b-91ae-364da2661108 | svn.boost.org | Exploit, Patch |
| [SECURITY] Fedora 16 Update: boost-1.47.0-7.fc16 | af854a3a-2127-422b-91ae-364da2661108 | lists.fedoraproject.org | |
| Memory allocator security revisited - Xi Wang | af854a3a-2127-422b-91ae-364da2661108 | kqueue.org | |
| Support / Security / Advisories / / MDVSA-2013:065 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.