First published: Wed Jul 25 2012(Updated: )
Integer overflow in the calloc function in libc/stdlib/malloc.c in jemalloc in libc for FreeBSD 6.4 and NetBSD makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which triggers a memory allocation of one byte.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =6.4 | |
NetBSD NetBSD |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.