Lucene search

K
cveMitreCVE-2009-3389
HistoryDec 17, 2009 - 5:30 p.m.

CVE-2009-3389

2009-12-1717:30:00
CWE-189
mitre
web.nvd.nist.gov
86
cve-2009-3389
integer overflow
libtheora
denial of service
nvd
security vulnerability

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

10

Confidence

High

EPSS

0.09

Percentile

94.6%

Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.

Affected configurations

Nvd
Node
mozillafirefoxMatch3.5.1
OR
mozillafirefoxMatch3.5.2
OR
mozillafirefoxMatch3.5.3
OR
mozillafirefoxMatch3.5.4
OR
mozillafirefoxMatch3.5.5
OR
mozillaseamonkeyRange2.0rc2
OR
mozillaseamonkeyMatch1.0
OR
mozillaseamonkeyMatch1.0alpha
OR
mozillaseamonkeyMatch1.0beta
OR
mozillaseamonkeyMatch1.0.1
OR
mozillaseamonkeyMatch1.0.2
OR
mozillaseamonkeyMatch1.0.3
OR
mozillaseamonkeyMatch1.0.4
OR
mozillaseamonkeyMatch1.0.5
OR
mozillaseamonkeyMatch1.0.6
OR
mozillaseamonkeyMatch1.0.7
OR
mozillaseamonkeyMatch1.0.8
OR
mozillaseamonkeyMatch1.0.9
OR
mozillaseamonkeyMatch1.0.99
OR
mozillaseamonkeyMatch1.1
OR
mozillaseamonkeyMatch1.1alpha
OR
mozillaseamonkeyMatch1.1beta
OR
mozillaseamonkeyMatch1.1.1
OR
mozillaseamonkeyMatch1.1.2
OR
mozillaseamonkeyMatch1.1.3
OR
mozillaseamonkeyMatch1.1.4
OR
mozillaseamonkeyMatch1.1.5
OR
mozillaseamonkeyMatch1.1.6
OR
mozillaseamonkeyMatch1.1.7
OR
mozillaseamonkeyMatch1.1.8
OR
mozillaseamonkeyMatch1.1.9
OR
mozillaseamonkeyMatch1.1.10
OR
mozillaseamonkeyMatch1.1.11
OR
mozillaseamonkeyMatch1.1.12
OR
mozillaseamonkeyMatch1.1.13
OR
mozillaseamonkeyMatch1.1.14
OR
mozillaseamonkeyMatch1.1.15
OR
mozillaseamonkeyMatch1.1.16
OR
mozillaseamonkeyMatch1.1.17
OR
mozillaseamonkeyMatch1.5.0.8
OR
mozillaseamonkeyMatch1.5.0.9
OR
mozillaseamonkeyMatch1.5.0.10
OR
mozillaseamonkeyMatch2.0
OR
mozillaseamonkeyMatch2.0alpha_1
OR
mozillaseamonkeyMatch2.0alpha_2
OR
mozillaseamonkeyMatch2.0alpha_3
OR
mozillaseamonkeyMatch2.0beta_1
OR
mozillaseamonkeyMatch2.0beta_2
OR
mozillaseamonkeyMatch2.0rc1
OR
mozillaseamonkeyMatch2.0a1pre
OR
mozillaseamonkeyMatch2.0a1pre
VendorProductVersionCPE
mozillafirefox3.5.1cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
mozillafirefox3.5.2cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
mozillafirefox3.5.3cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
mozillafirefox3.5.4cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*
mozillafirefox3.5.5cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*
mozillaseamonkey*cpe:2.3:a:mozilla:seamonkey:*:rc2:*:*:*:*:*:*
mozillaseamonkey1.0cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*
mozillaseamonkey1.0cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*
mozillaseamonkey1.0cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*
mozillaseamonkey1.0.1cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*
Rows per page:
1-10 of 511

References

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

AI Score

10

Confidence

High

EPSS

0.09

Percentile

94.6%