Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
:heavy_check_mark: This issue was automatically closed by Mend because the vulnerable library in the specific branch(es) was either marked as ignored or it is no longer part of the Mend inventory.
CVE-2016-9427 - High Severity Vulnerability
Vulnerable Libraries - boost-historyold-branches/jam/4_0, boost-historyold-branches/jam/4_0, boost-historyold-branches/jam/4_0, boost-historyold-branches/jam/4_0, boost-historyold-branches/jam/4_0, boost-historyold-branches/jam/4_0, boost-historyold-branches/jam/4_0, boost-historyold-branches/jam/4_0
Vulnerability Details
Integer overflow vulnerability in bdwgc before 2016-09-27 allows attackers to cause client of bdwgc denial of service (heap buffer overflow crash) and possibly execute arbitrary code via huge allocation.
Publish Date: 2016-12-12
URL: CVE-2016-9427
CVSS 3 Score Details (9.8)
Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High
For more information on CVSS3 Scores, click here.Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-9427
Release Date: 2016-12-12
Fix Resolution: v7.2h