First published: Mon Dec 12 2016(Updated: )
Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
bdwgc project bdwgc | <=7.4.4 | |
Debian GNU/Linux | =9.0 | |
openSUSE | =42.1 | |
openSUSE | =42.2 | |
openSUSE | =13.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9427 has a high severity as it can lead to denial of service and potential arbitrary code execution.
To fix CVE-2016-9427, update bdwgc to version 7.4.5 or later.
CVE-2016-9427 affects bdwgc versions before 7.4.5.
Exploiting CVE-2016-9427 can result in a heap buffer overflow crash and could allow attackers to execute arbitrary code.
CVE-2016-9427 impacts various distributions including Debian 9.0 and openSUSE versions 13.2, 42.1, and 42.2.