CVE-2009-0689
K-Meleon 1.5.3 - Remote Array Overrun
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
14Exploited in Wild
-Decision
Descriptions
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
Error de índice de matriz en la (1) implementación dtoa en archivo dtoa.c (también se conoce como pdtoa.c) y (2) la implementación gdtoa (también se conoce como dtoa new dtoa) en archivo gdtoa/misc.c en libc, tal y como es usado en múltiples sistemas operativos y productos, incluidos FreeBSD versiones 6.4 y 7.2, Net versión 5.0, OpenBSD versión 4.5, Mozilla Firefox versión 3.0.x y anteriores a las versión 3.0.15 y 3.5.x anterior a versión 3.5.4, K-Meleon versión 1.5.3, SeaMonkey versión 1.1.8 y otros productos, permite a los atacantes dependiendo del contexto causar una denegación de servicio (bloqueo de aplicación) y posiblemente ejecutar código arbitrario por medio de un valor de precisión largo en el argumento de formato para una función printf, que desencadena una asignación de memoria inapropiada y un desbordamiento de búfer en la región heap de la memoria durante la conversión a un número de punto flotante.
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. A buffer overflow flaw was found in the way PHP parsed floating point numbers from their text representation. If a PHP application converted untrusted input strings to numbers, an attacker able to provide such input could cause the application to crash or, possibly, execute arbitrary code with the privileges of the application. All php users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing the updated packages, the httpd daemon must be restarted for the update to take effect.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-02-22 CVE Reserved
- 2009-05-26 First Exploit
- 2009-07-01 CVE Published
- 2024-08-07 CVE Updated
- 2025-04-04 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (67)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/10186 | 2009-11-19 | |
https://www.exploit-db.com/exploits/10187 | 2009-11-19 | |
https://www.exploit-db.com/exploits/10185 | 2009-11-19 | |
https://www.exploit-db.com/exploits/10184 | 2009-11-19 | |
https://www.exploit-db.com/exploits/33480 | 2010-01-08 | |
https://www.exploit-db.com/exploits/33312 | 2009-10-27 | |
https://www.exploit-db.com/exploits/33364 | 2009-11-20 | |
https://www.exploit-db.com/exploits/33058 | 2009-05-26 | |
https://www.exploit-db.com/exploits/33363 | 2009-11-20 | |
https://www.exploit-db.com/exploits/33479 | 2010-01-08 | |
https://www.exploit-db.com/exploits/10380 | 2009-12-11 | |
https://github.com/Fullmetal5/str2hax | 2024-10-10 | |
http://securityreason.com/achievement_securityalert/63 | 2024-08-07 | |
http://www.securityfocus.com/bid/35510 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h | 2018-11-02 | |
http://securitytracker.com/id?1022478 | 2018-11-02 | |
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c | 2018-11-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
K-meleon Project Search vendor "K-meleon Project" | K-meleon Search vendor "K-meleon Project" for product "K-meleon" | 1.5.3 Search vendor "K-meleon Project" for product "K-meleon" and version "1.5.3" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.1 Search vendor "Mozilla" for product "Firefox" and version "3.0.1" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.2 Search vendor "Mozilla" for product "Firefox" and version "3.0.2" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.3 Search vendor "Mozilla" for product "Firefox" and version "3.0.3" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.4 Search vendor "Mozilla" for product "Firefox" and version "3.0.4" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.5 Search vendor "Mozilla" for product "Firefox" and version "3.0.5" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.6 Search vendor "Mozilla" for product "Firefox" and version "3.0.6" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.7 Search vendor "Mozilla" for product "Firefox" and version "3.0.7" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.8 Search vendor "Mozilla" for product "Firefox" and version "3.0.8" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.9 Search vendor "Mozilla" for product "Firefox" and version "3.0.9" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.10 Search vendor "Mozilla" for product "Firefox" and version "3.0.10" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.11 Search vendor "Mozilla" for product "Firefox" and version "3.0.11" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.12 Search vendor "Mozilla" for product "Firefox" and version "3.0.12" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.13 Search vendor "Mozilla" for product "Firefox" and version "3.0.13" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.14 Search vendor "Mozilla" for product "Firefox" and version "3.0.14" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.5 Search vendor "Mozilla" for product "Firefox" and version "3.5" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.5.1 Search vendor "Mozilla" for product "Firefox" and version "3.5.1" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.5.2 Search vendor "Mozilla" for product "Firefox" and version "3.5.2" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.5.3 Search vendor "Mozilla" for product "Firefox" and version "3.5.3" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Seamonkey Search vendor "Mozilla" for product "Seamonkey" | 1.1.8 Search vendor "Mozilla" for product "Seamonkey" and version "1.1.8" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release_p2 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release_p3 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release_p4 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release_p5 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | stable |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 7.2 Search vendor "Freebsd" for product "Freebsd" and version "7.2" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 7.2 Search vendor "Freebsd" for product "Freebsd" and version "7.2" | pre-release |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 7.2 Search vendor "Freebsd" for product "Freebsd" and version "7.2" | stable |
Affected
| ||||||
Netbsd Search vendor "Netbsd" | Netbsd Search vendor "Netbsd" for product "Netbsd" | 5.0 Search vendor "Netbsd" for product "Netbsd" and version "5.0" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openbsd Search vendor "Openbsd" for product "Openbsd" | 4.5 Search vendor "Openbsd" for product "Openbsd" and version "4.5" | - |
Affected
|