CVE-2009-0689
Description
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
Affected products
32- cpe:2.3:a:k-meleon_project:k-meleon:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*+ 17 more
- cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*+ 9 more
- cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.4:release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.4:release_p2:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.4:release_p3:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.4:release_p4:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.4:release_p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:6.4:stable:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:7.2:pre-release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:7.2:stable:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
53- cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.hnvdPatch
- securitytracker.com/idnvdPatch
- www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.cnvdPatchVendor Advisory
- securityreason.com/achievement_securityalert/63nvdExploit
- www.securityfocus.com/bid/35510nvdExploitPatch
- lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlnvdVendor Advisory
- secunia.com/advisories/37431nvdVendor Advisory
- secunia.com/advisories/37682nvdVendor Advisory
- secunia.com/advisories/37683nvdVendor Advisory
- secunia.com/advisories/38066nvdVendor Advisory
- secunia.com/advisories/38977nvdVendor Advisory
- secunia.com/advisories/39001nvdVendor Advisory
- secunia.com/secunia_research/2009-35/nvdVendor Advisory
- www.mozilla.org/security/announce/2009/mfsa2009-59.htmlnvdVendor Advisory
- www.vupen.com/english/advisories/2009/3297nvdVendor Advisory
- www.vupen.com/english/advisories/2009/3299nvdVendor Advisory
- www.vupen.com/english/advisories/2009/3334nvdVendor Advisory
- www.vupen.com/english/advisories/2010/0094nvdVendor Advisory
- www.vupen.com/english/advisories/2010/0648nvdVendor Advisory
- www.vupen.com/english/advisories/2010/0650nvdVendor Advisory
- lists.apple.com/archives/security-announce/2010/Jun/msg00003.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2009-11/msg00004.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.htmlnvd
- rhn.redhat.com/errata/RHSA-2014-0311.htmlnvd
- rhn.redhat.com/errata/RHSA-2014-0312.htmlnvd
- securityreason.com/achievement_securityalert/69nvd
- securityreason.com/achievement_securityalert/71nvd
- securityreason.com/achievement_securityalert/72nvd
- securityreason.com/achievement_securityalert/73nvd
- securityreason.com/achievement_securityalert/75nvd
- securityreason.com/achievement_securityalert/76nvd
- securityreason.com/achievement_securityalert/77nvd
- securityreason.com/achievement_securityalert/78nvd
- securityreason.com/achievement_securityalert/81nvd
- sunsolve.sun.com/search/document.donvd
- support.apple.com/kb/HT4077nvd
- support.apple.com/kb/HT4225nvd
- www.mandriva.com/security/advisoriesnvd
- www.mandriva.com/security/advisoriesnvd
- www.opera.com/support/kb/view/942/nvd
- www.redhat.com/support/errata/RHSA-2009-1601.htmlnvd
- www.redhat.com/support/errata/RHSA-2010-0153.htmlnvd
- www.redhat.com/support/errata/RHSA-2010-0154.htmlnvd
- www.securityfocus.com/archive/1/507977/100/0/threadednvd
- www.securityfocus.com/archive/1/507979/100/0/threadednvd
- www.securityfocus.com/archive/1/508417/100/0/threadednvd
- www.securityfocus.com/archive/1/508423/100/0/threadednvd
- www.ubuntu.com/usn/USN-915-1nvd
- bugzilla.mozilla.org/show_bug.cginvd
- bugzilla.mozilla.org/show_bug.cginvd
- lists.debian.org/debian-lts-announce/2018/11/msg00001.htmlnvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6528nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9541nvd
News mentions
0No linked articles in our index yet.