Lucene search

K
cveCertccCVE-2009-0689
HistoryJul 01, 2009 - 1:00 p.m.

CVE-2009-0689

2009-07-0113:00:01
CWE-119
certcc
web.nvd.nist.gov
77
cve-2009-0689
array index error
dtoa implementation
gdtoa implementation
libc
denial of service
heap-based buffer overflow
nvd

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.5

Confidence

High

EPSS

0.97

Percentile

99.7%

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

Affected configurations

Nvd
Node
k-meleon_projectk-meleonMatch1.5.3
OR
mozillafirefoxMatch3.0.1
OR
mozillafirefoxMatch3.0.2
OR
mozillafirefoxMatch3.0.3
OR
mozillafirefoxMatch3.0.4
OR
mozillafirefoxMatch3.0.5
OR
mozillafirefoxMatch3.0.6
OR
mozillafirefoxMatch3.0.7
OR
mozillafirefoxMatch3.0.8
OR
mozillafirefoxMatch3.0.9
OR
mozillafirefoxMatch3.0.10
OR
mozillafirefoxMatch3.0.11
OR
mozillafirefoxMatch3.0.12
OR
mozillafirefoxMatch3.0.13
OR
mozillafirefoxMatch3.0.14
OR
mozillafirefoxMatch3.5
OR
mozillafirefoxMatch3.5.1
OR
mozillafirefoxMatch3.5.2
OR
mozillafirefoxMatch3.5.3
OR
mozillaseamonkeyMatch1.1.8
OR
freebsdfreebsdMatch6.4
OR
freebsdfreebsdMatch6.4release
OR
freebsdfreebsdMatch6.4release_p2
OR
freebsdfreebsdMatch6.4release_p3
OR
freebsdfreebsdMatch6.4release_p4
OR
freebsdfreebsdMatch6.4release_p5
OR
freebsdfreebsdMatch6.4stable
OR
freebsdfreebsdMatch7.2
OR
freebsdfreebsdMatch7.2pre-release
OR
freebsdfreebsdMatch7.2stable
OR
netbsdnetbsdMatch5.0
OR
openbsdopenbsdMatch4.5
VendorProductVersionCPE
k-meleon_projectk-meleon1.5.3cpe:2.3:a:k-meleon_project:k-meleon:1.5.3:*:*:*:*:*:*:*
mozillafirefox3.0.1cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
mozillafirefox3.0.2cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
mozillafirefox3.0.3cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
mozillafirefox3.0.4cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
mozillafirefox3.0.5cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
mozillafirefox3.0.6cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
mozillafirefox3.0.7cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
mozillafirefox3.0.8cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
mozillafirefox3.0.9cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
Rows per page:
1-10 of 321

References

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

AI Score

7.5

Confidence

High

EPSS

0.97

Percentile

99.7%