Vulnerability Description
Integer overflow in the calloc function in libc/stdlib/malloc.c in jemalloc in libc for FreeBSD 6.4 and NetBSD makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which triggers a memory allocation of one byte.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freebsd | Freebsd | 6.4 |
| Netbsd | Netbsd | All versions |
Related Weaknesses (CWE)
References
- http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/
- http://svnweb.freebsd.org/base?view=revision&revision=161263Patch
- http://kqueue.org/blog/2012/03/05/memory-allocator-security-revisited/
- http://svnweb.freebsd.org/base?view=revision&revision=161263Patch
FAQ
What is CVE-2006-7252?
CVE-2006-7252 is a vulnerability with a CVSS score of 5.0 (MEDIUM). Integer overflow in the calloc function in libc/stdlib/malloc.c in jemalloc in libc for FreeBSD 6.4 and NetBSD makes it easier for context-dependent attackers to perform memory-related attacks such as...
How severe is CVE-2006-7252?
CVE-2006-7252 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-7252?
Check the references section above for vendor advisories and patch information. Affected products include: Freebsd Freebsd, Netbsd Netbsd.