CVE-2009-0689
K-Meleon 1.5.3 - Remote Array Overrun
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
13Exploited in Wild
-Decision
Descriptions
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
Error de índice de matriz en la (1) implementación dtoa en archivo dtoa.c (también se conoce como pdtoa.c) y (2) la implementación gdtoa (también se conoce como dtoa new dtoa) en archivo gdtoa/misc.c en libc, tal y como es usado en múltiples sistemas operativos y productos, incluidos FreeBSD versiones 6.4 y 7.2, Net versión 5.0, OpenBSD versión 4.5, Mozilla Firefox versión 3.0.x y anteriores a las versión 3.0.15 y 3.5.x anterior a versión 3.5.4, K-Meleon versión 1.5.3, SeaMonkey versión 1.1.8 y otros productos, permite a los atacantes dependiendo del contexto causar una denegación de servicio (bloqueo de aplicación) y posiblemente ejecutar código arbitrario por medio de un valor de precisión largo en el argumento de formato para una función printf, que desencadena una asignación de memoria inapropiada y un desbordamiento de búfer en la región heap de la memoria durante la conversión a un número de punto flotante.
KDE KDELibs version 4.3.3 suffers from a remote array overrun vulnerability that allows for arbitrary code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2009-02-22 CVE Reserved
- 2009-05-26 First Exploit
- 2009-06-26 CVE Published
- 2023-10-04 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (66)
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/10186 | 2009-11-19 | |
https://www.exploit-db.com/exploits/10187 | 2009-11-19 | |
https://www.exploit-db.com/exploits/10185 | 2009-11-19 | |
https://www.exploit-db.com/exploits/10184 | 2009-11-19 | |
https://www.exploit-db.com/exploits/33480 | 2010-01-08 | |
https://www.exploit-db.com/exploits/33312 | 2009-10-27 | |
https://www.exploit-db.com/exploits/33364 | 2009-11-20 | |
https://www.exploit-db.com/exploits/33058 | 2009-05-26 | |
https://www.exploit-db.com/exploits/33363 | 2009-11-20 | |
https://www.exploit-db.com/exploits/33479 | 2010-01-08 | |
https://www.exploit-db.com/exploits/10380 | 2009-12-11 | |
http://securityreason.com/achievement_securityalert/63 | 2024-08-07 | |
http://www.securityfocus.com/bid/35510 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h | 2018-11-02 | |
http://securitytracker.com/id?1022478 | 2018-11-02 | |
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c | 2018-11-02 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
K-meleon Project Search vendor "K-meleon Project" | K-meleon Search vendor "K-meleon Project" for product "K-meleon" | 1.5.3 Search vendor "K-meleon Project" for product "K-meleon" and version "1.5.3" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.1 Search vendor "Mozilla" for product "Firefox" and version "3.0.1" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.2 Search vendor "Mozilla" for product "Firefox" and version "3.0.2" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.3 Search vendor "Mozilla" for product "Firefox" and version "3.0.3" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.4 Search vendor "Mozilla" for product "Firefox" and version "3.0.4" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.5 Search vendor "Mozilla" for product "Firefox" and version "3.0.5" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.6 Search vendor "Mozilla" for product "Firefox" and version "3.0.6" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.7 Search vendor "Mozilla" for product "Firefox" and version "3.0.7" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.8 Search vendor "Mozilla" for product "Firefox" and version "3.0.8" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.9 Search vendor "Mozilla" for product "Firefox" and version "3.0.9" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.10 Search vendor "Mozilla" for product "Firefox" and version "3.0.10" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.11 Search vendor "Mozilla" for product "Firefox" and version "3.0.11" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.12 Search vendor "Mozilla" for product "Firefox" and version "3.0.12" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.13 Search vendor "Mozilla" for product "Firefox" and version "3.0.13" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.0.14 Search vendor "Mozilla" for product "Firefox" and version "3.0.14" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.5 Search vendor "Mozilla" for product "Firefox" and version "3.5" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.5.1 Search vendor "Mozilla" for product "Firefox" and version "3.5.1" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.5.2 Search vendor "Mozilla" for product "Firefox" and version "3.5.2" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Firefox Search vendor "Mozilla" for product "Firefox" | 3.5.3 Search vendor "Mozilla" for product "Firefox" and version "3.5.3" | - |
Affected
| ||||||
Mozilla Search vendor "Mozilla" | Seamonkey Search vendor "Mozilla" for product "Seamonkey" | 1.1.8 Search vendor "Mozilla" for product "Seamonkey" and version "1.1.8" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release_p2 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release_p3 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release_p4 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | release_p5 |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 6.4 Search vendor "Freebsd" for product "Freebsd" and version "6.4" | stable |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 7.2 Search vendor "Freebsd" for product "Freebsd" and version "7.2" | - |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 7.2 Search vendor "Freebsd" for product "Freebsd" and version "7.2" | pre-release |
Affected
| ||||||
Freebsd Search vendor "Freebsd" | Freebsd Search vendor "Freebsd" for product "Freebsd" | 7.2 Search vendor "Freebsd" for product "Freebsd" and version "7.2" | stable |
Affected
| ||||||
Netbsd Search vendor "Netbsd" | Netbsd Search vendor "Netbsd" for product "Netbsd" | 5.0 Search vendor "Netbsd" for product "Netbsd" and version "5.0" | - |
Affected
| ||||||
Openbsd Search vendor "Openbsd" | Openbsd Search vendor "Openbsd" for product "Openbsd" | 4.5 Search vendor "Openbsd" for product "Openbsd" and version "4.5" | - |
Affected
|