Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0689

Опубликовано: 01 июл. 2009
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 6.8

Описание

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

РелизСтатусПримечание
dapper

DNE

devel

released

4:3.5.10.dfsg.1-2.1ubuntu4
hardy

ignored

end of life
intrepid

released

4:4.1.4-0ubuntu1~intrepid1.5
jaunty

released

4:4.2.2-0ubuntu5.4
karmic

released

4:4.3.2-0ubuntu7.2
lucid

released

4:3.5.10.dfsg.1-2.1ubuntu4
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

ignored

end of life
devel

released

4:3.5.10.dfsg.1-2.1ubuntu4
hardy

released

4:3.5.10-0ubuntu1~hardy1.5
intrepid

released

4:3.5.10-0ubuntu6.4
jaunty

released

4:3.5.10.dfsg.1-1ubuntu8.4
karmic

released

4:3.5.10.dfsg.1-2ubuntu7.2
lucid

released

4:3.5.10.dfsg.1-2.1ubuntu4
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

3.0.3+nobinonly-0ubuntu1
hardy

released

2.0.0.24+build1+nobinonly-0ubuntu0.8.04.1
intrepid

released

2.0.0.24+build1+nobinonly-0ubuntu0.8.10.1
jaunty

released

2.0.0.24+build1+nobinonly-0ubuntu0.9.04.1
karmic

released

2.0.0.24+build1+nobinonly-0ubuntu0.9.10.1
lucid

not-affected

3.0.3+nobinonly-0ubuntu1
upstream

released

2.0.0.24

Показывать по

EPSS

Процентиль: 97%
0.4232
Средний

6.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

nvd
почти 16 лет назад

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

debian
почти 16 лет назад

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa. ...

github
около 3 лет назад

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

oracle-oval
больше 15 лет назад

ELSA-2009-1601: kdelibs security update (CRITICAL)

EPSS

Процентиль: 97%
0.4232
Средний

6.8 Medium

CVSS2