First published: Wed Jul 25 2012(Updated: )
Boost is vulnerable to a buffer overflow, caused by improper bounds checking by the ordered_malloc() function. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Data Virtualization on Cloud Pak for Data | <=3.0 | |
IBM Watson Query with Cloud Pak for Data | <=2.2 | |
IBM Watson Query with Cloud Pak for Data | <=2.1 | |
IBM Watson Query with Cloud Pak for Data | <=2.0 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.8 | |
IBM Data Virtualization on Cloud Pak for Data | <=1.7 | |
Boost C++ Libraries | <=1.0.0 | |
Boost C++ Libraries | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2677 has a severity rating of high due to the potential for remote code execution.
To fix CVE-2012-2677, you should update the affected Boost Pool library to a version that has addressed the buffer overflow vulnerability.
CVE-2012-2677 affects Boost Pool versions up to and including 1.0.0 and version 2.0.0, as well as specific versions of IBM Db2 on Cloud Pak for Data.
CVE-2012-2677 is a buffer overflow vulnerability caused by improper bounds checking in the ordered_malloc() function.
An attacker could exploit CVE-2012-2677 to execute arbitrary code on the system or crash the affected application.