Lucene search

K
amazonAmazonALAS-2013-245
HistoryNov 04, 2013 - 2:53 p.m.

Medium: gc

2013-11-0414:53:00
alas.aws.amazon.com
10

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.007

Percentile

80.9%

Issue Overview:

It was discovered that gc’s implementation of the malloc() and calloc() routines did not properly perform parameter sanitization when allocating memory. If an application using gc did not implement application-level validity checks for the malloc() and calloc() routines, a remote attacker could provide specially crafted application-specific input, which, when processed by the application, could lead to an application crash or, potentially, arbitrary code execution with the privileges of the user running the application. (CVE-2012-2673)

Affected Packages:

gc

Issue Correction:
Run yum update gc to update your system.

New Packages:

i686:  
    gc-devel-7.1-12.6.amzn1.i686  
    gc-7.1-12.6.amzn1.i686  
    gc-debuginfo-7.1-12.6.amzn1.i686  
  
src:  
    gc-7.1-12.6.amzn1.src  
  
x86_64:  
    gc-7.1-12.6.amzn1.x86_64  
    gc-debuginfo-7.1-12.6.amzn1.x86_64  
    gc-devel-7.1-12.6.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-2673

Mitre: CVE-2012-2673

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.007

Percentile

80.9%