CVE-2009-0689
Published: 01 July 2009
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
Priority
Status
Package | Release | Status |
---|---|---|
kde4libs Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Patches: Upstream: http://lists.kde.org/?l=kde-commits&m=125874573511598&w=2 Upstream: http://websvn.kde.org/?view=revision&revision=1052100 |
||
kdelibs Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Patches: Upstream: http://lists.kde.org/?l=kde-commits&m=125874573511598&w=2 |
||
thunderbird Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.0.0.24)
|
Notes
Author | Note |
---|---|
mdeslaur | description omitted KDE. Mozilla has CVE-2009-1563 for the same issue. Red Hat released RHSA-2009:1601-01 to fix kdelibs |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689
- http://marc.info/?l=full-disclosure&m=125867830114502&w=2
- http://securityreason.com/achievement_securityalert/63
- http://securityreason.com/achievement_securityalert/74
- https://rhn.redhat.com/errata/RHSA-2009-1601.html
- https://usn.ubuntu.com/usn/usn-871-1
- https://usn.ubuntu.com/usn/usn-915-1
- NVD
- Launchpad
- Debian