MEDIUM · 6.8

CVE-2009-0689

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products inc...

Vulnerability Description

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

CVSS Score

6.8

MEDIUM

AV:N/AC:M/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
K-Meleon ProjectK-Meleon1.5.3
MozillaFirefox3.0.1
MozillaSeamonkey1.1.8
FreebsdFreebsd6.4
NetbsdNetbsd5.0
OpenbsdOpenbsd4.5

Related Weaknesses (CWE)

References

FAQ

What is CVE-2009-0689?

CVE-2009-0689 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products inc...

How severe is CVE-2009-0689?

CVE-2009-0689 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2009-0689?

Check the references section above for vendor advisories and patch information. Affected products include: K-Meleon Project K-Meleon, Mozilla Firefox, Mozilla Seamonkey, Freebsd Freebsd, Netbsd Netbsd.