Уязвимость CVE-2009-0689: Информация

Описание

Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.

Важность: MEDIUM (6,8)

Опубликовано: 1 июля 2009 г.
Изменено: 2 ноября 2018 г.
Идентификатор типа ошибки: CWE-119

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
35510
  • Exploit
  • Patch
1022478
  • Patch
http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libc/gdtoa/misc.c
  • Patch
  • Vendor Advisory
20090625 Multiple Vendors libc/gdtoa printf(3) Array Overrun
  • Exploit
http://cvsweb.netbsd.org/bsdweb.cgi/src/lib/libc/gdtoa/gdtoaimp.h
  • Patch
20091211 Sunbird 0.9 Array Overrun (code execution)
    http://www.opera.com/support/kb/view/942/
      RHSA-2009:1601
        20091120 K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution)
          ADV-2009-3297
          • Vendor Advisory
          20091120 Opera 10.01 Remote Array Overrun (Arbitrary code execution)
            37683
            • Vendor Advisory
            37431
            • Vendor Advisory
            20091120 SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution)
              272909
                ADV-2009-3299
                • Vendor Advisory
                MDVSA-2009:294
                  37682
                  • Vendor Advisory
                  https://bugzilla.mozilla.org/show_bug.cgi?id=516396
                    MDVSA-2009:330
                      SUSE-SR:2009:018
                        https://bugzilla.mozilla.org/show_bug.cgi?id=516862
                          http://secunia.com/secunia_research/2009-35/
                          • Vendor Advisory
                          20091211 Thunderbird 2.0.0.23 (lib) Remote Array Overrun (Arbitrary code execution)
                            ADV-2009-3334
                            • Vendor Advisory
                            http://www.mozilla.org/security/announce/2009/mfsa2009-59.html
                            • Vendor Advisory
                            20091211 Flock 2.5.2 Remote Array Overrun (Arbitrary code execution)
                              20091211 Camino 1.6.10 Remote Array Overrun (Arbitrary code execution)
                                20091030 Multiple BSD printf(1) and multiple dtoa/*printf(3) vulnerabilities
                                  38066
                                  • Vendor Advisory
                                  ADV-2010-0094
                                  • Vendor Advisory
                                  20100108 MacOS X 10.5/10.6 libc/strtod(3) buffer overflow
                                    39001
                                    • Vendor Advisory
                                    RHSA-2010:0153
                                      RHSA-2010:0154
                                        ADV-2010-0650
                                        • Vendor Advisory
                                        USN-915-1
                                          ADV-2010-0648
                                          • Vendor Advisory
                                          38977
                                          • Vendor Advisory
                                          APPLE-SA-2010-03-29-1
                                          • Vendor Advisory
                                          http://support.apple.com/kb/HT4077
                                            SUSE-SR:2010:013
                                              http://support.apple.com/kb/HT4225
                                                APPLE-SA-2010-06-21-1
                                                  RHSA-2014:0311
                                                    RHSA-2014:0312
                                                      oval:org.mitre.oval:def:9541
                                                        oval:org.mitre.oval:def:6528
                                                          20091210 Camino 1.6.10 Remote Array Overrun (Arbitrary code execution)
                                                            20091210 Flock 2.5.2 Remote Array Overrun (Arbitrary code execution)
                                                              20091120 SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution)
                                                                20091120 K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution)
                                                                  [debian-lts-announce] 20181101 [SECURITY] [DLA 1564-1] mono security update
                                                                      1. Конфигурация 1

                                                                        cpe:2.3:o:freebsd:freebsd:6.4:release_p2:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:6.4:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.9:*:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:6.4:release_p5:*:*:*:*:*:*

                                                                        cpe:2.3:o:netbsd:netbsd:5.0:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:k-meleon_project:k-meleon:1.5.3:*:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:6.4:release:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.14:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.10:*:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:6.4:stable:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:6.4:release_p4:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.12:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*

                                                                        cpe:2.3:o:openbsd:openbsd:4.5:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:7.2:pre-release:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:7.2:*:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:6.4:release_p3:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.13:*:*:*:*:*:*:*

                                                                        cpe:2.3:o:freebsd:freebsd:7.2:stable:*:*:*:*:*:*

                                                                        cpe:2.3:a:mozilla:firefox:3.0.11:*:*:*:*:*:*:*