Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool prior to 3.9 makes it easier for context-dependent malicious users to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
boost pool 2.0.0 |
||
boost pool |