ID CVE-2009-1563
Summary ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-0689. Reason: This candidate is a duplicate of CVE-2009-0689. Certain codebase relationships were not originally clear. Notes: All CVE users should reference CVE-2009-0689 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
References
Vulnerable Configurations
CVSS
Base: 5.0
Impact:
Exploitability:
Access
VectorComplexityAuthentication
Impact
ConfidentialityIntegrityAvailability
oval via4
accepted 2013-04-29T04:17:57.864-04:00
class vulnerability
contributors
  • name Aharon Chernin
    organization SCAP.com, LLC
  • name Dragos Prisaca
    organization G2, Inc.
definition_extensions
  • comment The operating system installed on the system is Red Hat Enterprise Linux 3
    oval oval:org.mitre.oval:def:11782
  • comment CentOS Linux 3.x
    oval oval:org.mitre.oval:def:16651
  • comment The operating system installed on the system is Red Hat Enterprise Linux 4
    oval oval:org.mitre.oval:def:11831
  • comment CentOS Linux 4.x
    oval oval:org.mitre.oval:def:16636
  • comment Oracle Linux 4.x
    oval oval:org.mitre.oval:def:15990
  • comment The operating system installed on the system is Red Hat Enterprise Linux 5
    oval oval:org.mitre.oval:def:11414
  • comment The operating system installed on the system is CentOS Linux 5.x
    oval oval:org.mitre.oval:def:15802
  • comment Oracle Linux 5.x
    oval oval:org.mitre.oval:def:15459
description Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
family unix
id oval:org.mitre.oval:def:8888
status accepted
submitted 2010-07-09T03:56:16-04:00
title ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2009-0689. Reason: This candidate is a duplicate of CVE-2009-0689. Certain codebase relationships were not originally clear. Notes: All CVE users should reference CVE-2009-0689 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
version 25
redhat via4
rpms
  • nspr-0:4.7.6-1.el4_8
  • nspr-devel-0:4.7.6-1.el4_8
  • firefox-0:3.0.15-3.el4
  • nspr-0:4.7.6-1.el5_4
  • nspr-devel-0:4.7.6-1.el5_4
  • xulrunner-0:1.9.0.15-3.el5_4
  • xulrunner-devel-0:1.9.0.15-3.el5_4
  • xulrunner-devel-unstable-0:1.9.0.15-3.el5_4
  • firefox-0:3.0.15-3.el5_4
  • seamonkey-0:1.0.9-0.47.el3
  • seamonkey-chat-0:1.0.9-0.47.el3
  • seamonkey-devel-0:1.0.9-0.47.el3
  • seamonkey-dom-inspector-0:1.0.9-0.47.el3
  • seamonkey-js-debugger-0:1.0.9-0.47.el3
  • seamonkey-mail-0:1.0.9-0.47.el3
  • seamonkey-nspr-0:1.0.9-0.47.el3
  • seamonkey-nspr-devel-0:1.0.9-0.47.el3
  • seamonkey-nss-0:1.0.9-0.47.el3
  • seamonkey-nss-devel-0:1.0.9-0.47.el3
  • seamonkey-0:1.0.9-50.el4_8
  • seamonkey-chat-0:1.0.9-50.el4_8
  • seamonkey-devel-0:1.0.9-50.el4_8
  • seamonkey-dom-inspector-0:1.0.9-50.el4_8
  • seamonkey-js-debugger-0:1.0.9-50.el4_8
  • seamonkey-mail-0:1.0.9-50.el4_8
refmap via4
Last major update 19-12-2009 - 06:54
Published 29-10-2009 - 14:30
Back to Top