Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
0

CVE-2009-0689

Disclosure Date: July 01, 2009
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • freebsd,
  • k-meleon project,
  • mozilla,
  • netbsd,
  • openbsd

Products

  • firefox 3.0.1,
  • firefox 3.0.10,
  • firefox 3.0.11,
  • firefox 3.0.12,
  • firefox 3.0.13,
  • firefox 3.0.14,
  • firefox 3.0.2,
  • firefox 3.0.3,
  • firefox 3.0.4,
  • firefox 3.0.5,
  • firefox 3.0.6,
  • firefox 3.0.7,
  • firefox 3.0.8,
  • firefox 3.0.9,
  • firefox 3.5,
  • firefox 3.5.1,
  • firefox 3.5.2,
  • firefox 3.5.3,
  • freebsd 6.4,
  • freebsd 7.2,
  • k-meleon 1.5.3,
  • netbsd 5.0,
  • openbsd 4.5,
  • seamonkey 1.1.8

References

Advisory

Additional Info

Technical Analysis