Lucene search

K
nvd[email protected]NVD:CVE-2009-0689
HistoryJul 01, 2009 - 1:00 p.m.

CVE-2009-0689

2009-07-0113:00:01
CWE-119
web.nvd.nist.gov

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.5 Medium

AI Score

Confidence

High

0.97 High

EPSS

Percentile

99.7%

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

Affected configurations

NVD
Node
k-meleon_projectk-meleonMatch1.5.3
OR
mozillafirefoxMatch3.0.1
OR
mozillafirefoxMatch3.0.2
OR
mozillafirefoxMatch3.0.3
OR
mozillafirefoxMatch3.0.4
OR
mozillafirefoxMatch3.0.5
OR
mozillafirefoxMatch3.0.6
OR
mozillafirefoxMatch3.0.7
OR
mozillafirefoxMatch3.0.8
OR
mozillafirefoxMatch3.0.9
OR
mozillafirefoxMatch3.0.10
OR
mozillafirefoxMatch3.0.11
OR
mozillafirefoxMatch3.0.12
OR
mozillafirefoxMatch3.0.13
OR
mozillafirefoxMatch3.0.14
OR
mozillafirefoxMatch3.5
OR
mozillafirefoxMatch3.5.1
OR
mozillafirefoxMatch3.5.2
OR
mozillafirefoxMatch3.5.3
OR
mozillaseamonkeyMatch1.1.8
OR
freebsdfreebsdMatch6.4
OR
freebsdfreebsdMatch6.4release
OR
freebsdfreebsdMatch6.4release_p2
OR
freebsdfreebsdMatch6.4release_p3
OR
freebsdfreebsdMatch6.4release_p4
OR
freebsdfreebsdMatch6.4release_p5
OR
freebsdfreebsdMatch6.4stable
OR
freebsdfreebsdMatch7.2
OR
freebsdfreebsdMatch7.2pre-release
OR
freebsdfreebsdMatch7.2stable
OR
netbsdnetbsdMatch5.0
OR
openbsdopenbsdMatch4.5

References

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.5 Medium

AI Score

Confidence

High

0.97 High

EPSS

Percentile

99.7%