CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
EPSS
Percentile
80.9%
Issue Overview:
It was discovered that gc’s implementation of the malloc() and calloc() routines did not properly perform parameter sanitization when allocating memory. If an application using gc did not implement application-level validity checks for the malloc() and calloc() routines, a remote attacker could provide specially crafted application-specific input, which, when processed by the application, could lead to an application crash or, potentially, arbitrary code execution with the privileges of the user running the application. (CVE-2012-2673)
Affected Packages:
gc
Issue Correction:
Run yum update gc to update your system.
New Packages:
i686:
gc-devel-7.1-12.6.amzn1.i686
gc-7.1-12.6.amzn1.i686
gc-debuginfo-7.1-12.6.amzn1.i686
src:
gc-7.1-12.6.amzn1.src
x86_64:
gc-7.1-12.6.amzn1.x86_64
gc-debuginfo-7.1-12.6.amzn1.x86_64
gc-devel-7.1-12.6.amzn1.x86_64
Red Hat: CVE-2012-2673
Mitre: CVE-2012-2673
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | i686 | gc-devel | < 7.1-12.6.amzn1 | gc-devel-7.1-12.6.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | gc | < 7.1-12.6.amzn1 | gc-7.1-12.6.amzn1.i686.rpm |
Amazon Linux | 1 | i686 | gc-debuginfo | < 7.1-12.6.amzn1 | gc-debuginfo-7.1-12.6.amzn1.i686.rpm |
Amazon Linux | 1 | x86_64 | gc | < 7.1-12.6.amzn1 | gc-7.1-12.6.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | gc-debuginfo | < 7.1-12.6.amzn1 | gc-debuginfo-7.1-12.6.amzn1.x86_64.rpm |
Amazon Linux | 1 | x86_64 | gc-devel | < 7.1-12.6.amzn1 | gc-devel-7.1-12.6.amzn1.x86_64.rpm |