First published: Wed Jul 25 2012(Updated: )
Integer overflow in the calloc function in libc/stdlib/malloc.c in jemalloc in libc for FreeBSD 6.4 and NetBSD makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which triggers a memory allocation of one byte.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =6.4 | |
NetBSD current |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-7252 is considered a medium severity vulnerability due to its potential for enabling memory-related attacks.
To fix CVE-2006-7252, upgrade to a patched version of FreeBSD or NetBSD that addresses this integer overflow issue.
CVE-2006-7252 may allow attackers to perform memory-related attacks such as buffer overflows.
CVE-2006-7252 affects FreeBSD version 6.4 and various versions of NetBSD.
The vulnerability in CVE-2006-7252 lies within the calloc function in the jemalloc memory allocator used by libc.