CVE Vulnerabilities

CVE-2012-2677

Published: Jul 25, 2012 | Modified: Apr 11, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
5.1 MODERATE
AV:N/AC:H/Au:N/C:P/I:P/A:P
RedHat/V3
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.

Affected Software

NameVendorStart VersionEnd Version
PoolBoost*1.0.0 (including)
PoolBoost2.0.0 (including)2.0.0 (including)
Red Hat Enterprise Linux 5RedHatboost-0:1.33.1-16.el5_9*
Red Hat Enterprise Linux 6RedHatboost-0:1.41.0-15.el6_4*
BoostUbuntuhardy*
Boost1.40Ubuntulucid*
Boost1.42Ubuntunatty*
Boost1.42Ubuntuoneiric*
Boost1.46Ubuntuoneiric*
Boost1.46Ubuntuprecise*
Boost1.46Ubuntuprecise/esm*
Boost1.48Ubuntuprecise*
Boost1.49Ubuntuupstream*
Boost1.50Ubuntuquantal*

References