Lucene search

K
prionPRIOn knowledge basePRION:CVE-2012-2677
HistoryJul 25, 2012 - 7:55 p.m.

Integer overflow

2012-07-2519:55:00
PRIOn knowledge base
www.prio-n.com
2

7.2 High

AI Score

Confidence

Low

0.014 Low

EPSS

Percentile

86.5%

Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.

CPENameOperatorVersion
pooleq2.0.0
poolle1.0.0

7.2 High

AI Score

Confidence

Low

0.014 Low

EPSS

Percentile

86.5%