Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-0689

Опубликовано: 20 нояб. 2009
Источник: redhat
CVSS2: 6.8

Описание

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
OpenShift Enterprise 1jsAffected
Red Hat OpenShift Enterprise 2jsAffected
Red Hat Enterprise Linux 3seamonkeyFixedRHSA-2009:153127.10.2009
Red Hat Enterprise Linux 4firefoxFixedRHSA-2009:153027.10.2009
Red Hat Enterprise Linux 4nsprFixedRHSA-2009:153027.10.2009
Red Hat Enterprise Linux 4seamonkeyFixedRHSA-2009:153127.10.2009
Red Hat Enterprise Linux 4kdelibsFixedRHSA-2009:160124.11.2009
Red Hat Enterprise Linux 4thunderbirdFixedRHSA-2010:015417.03.2010
Red Hat Enterprise Linux 5firefoxFixedRHSA-2009:153027.10.2009
Red Hat Enterprise Linux 5nsprFixedRHSA-2009:153027.10.2009

Показывать по

Дополнительная информация

Статус:

Critical
https://bugzilla.redhat.com/show_bug.cgi?id=539784array index error in dtoa implementation of many products

6.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 16 лет назад

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

nvd
почти 16 лет назад

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

debian
почти 16 лет назад

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa. ...

github
около 3 лет назад

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

oracle-oval
больше 15 лет назад

ELSA-2009-1601: kdelibs security update (CRITICAL)

6.8 Medium

CVSS2