Boehm-Demers-Weiser Garbage Collector prior 5.0 malloc malloc.c GC_generic_malloc_ignore_off_page numeric error
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.1 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Boehm-Demers-Weiser Garbage Collector and classified as critical. Impacted is the function GC_generic_malloc_ignore_off_page of the file malloc.c of the component malloc. Performing a manipulation results in numeric error.
This vulnerability is reported as CVE-2012-2673. No exploit exists.
The affected component should be upgraded.
Details
A vulnerability classified as critical has been found in Boehm-Demers-Weiser Garbage Collector. This affects the function GC_generic_malloc_ignore_off_page of the file malloc.c of the component malloc. The manipulation with an unknown input leads to a numeric error vulnerability. CWE is classifying the issue as CWE-189. This is going to have an impact on integrity. The summary by CVE is:
Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc funtions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected.
The weakness was disclosed 07/25/2012 by Xi Wang (Website). It is possible to read the advisory at github.com. This vulnerability is uniquely identified as CVE-2012-2673 since 05/14/2012. The exploitability is told to be easy. It is possible to initiate the attack remotely. No form of authentication is needed for exploitation. Technical details of the vulnerability are known, but there is no available exploit.
The vulnerability scanner Nessus provides a plugin with the ID 70754 (Oracle Linux 6 : gc (ELSA-2013-1500)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Oracle Linux Local Security Checks. The commercial vulnerability scanner Qualys is able to test this issue with plugin 350499 (Amazon Linux Security Advisory for gc: ALAS-2013-245).
Upgrading to version 5.0 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (76649), Tenable (70754), SecurityFocus (BID 54227†) and Vulnerability Center (SBV-36075†). Be aware that VulDB is the high quality source for vulnerability data.
Product
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.1
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Numeric errorCWE: CWE-189
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 70754
Nessus Name: Oracle Linux 6 : gc (ELSA-2013-1500)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Port: 🔍
OpenVAS ID: 881818
OpenVAS Name: CentOS Update for gc CESA-2013:1500 centos6
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Garbage Collector 5.0
Patch: github.com
Timeline
05/14/2012 🔍06/28/2012 🔍
06/28/2012 🔍
07/25/2012 🔍
07/25/2012 🔍
09/05/2012 🔍
11/05/2013 🔍
03/23/2015 🔍
12/31/2024 🔍
Sources
Advisory: RHSA-2013:1500Researcher: Xi Wang
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2012-2673 (🔍)
GCVE (CVE): GCVE-0-2012-2673
GCVE (VulDB): GCVE-100-61407
OVAL: 🔍
X-Force: 76649
SecurityFocus: 54227 - Boehm GC malloc()' and 'calloc()' Multiple Buffer Overflow Vulnerabilities
Vulnerability Center: 36075 - Boehm-Demers-Weiser GC Multiple Remote Integer Overflow Vulnerabilities, High
Entry
Created: 03/23/2015 16:50Updated: 12/31/2024 08:13
Changes: 03/23/2015 16:50 (61), 04/16/2017 11:39 (12), 12/07/2021 01:00 (4), 12/07/2021 01:15 (1), 12/07/2021 01:23 (2), 12/31/2024 08:13 (18)
Complete: 🔍
Cache ID: 216:D1C:103
Be aware that VulDB is the high quality source for vulnerability data.
No comments yet. Languages: en.
Please log in to comment.