Description
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-376-1 | mono security update |
Debian DLA |
DLA-1564-1 | mono security update |
Debian DSA |
DSA-1998-1 | New kdelibs packages fix arbitrary code execution |
Ubuntu USN |
USN-871-1 | KDE vulnerabilities |
Ubuntu USN |
USN-915-1 | Thunderbird vulnerabilities |
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Freebsd
Subscribe
Freebsd
Subscribe
K-meleon Project
Subscribe
K-meleon
Subscribe
Mozilla
Subscribe
Firefox
Subscribe
Seamonkey
Subscribe
Netbsd
Subscribe
Netbsd
Subscribe
Openbsd
Subscribe
Openbsd
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Rhel Eus
Subscribe
Rhel Mission Critical
Subscribe
Status: PUBLISHED
Assigner: certcc
Published:
Updated: 2024-08-07T04:40:05.365Z
Reserved: 2009-02-22T00:00:00.000Z
Link: CVE-2009-0689
No data.
Status : Modified
Published: 2009-07-01T13:00:01.360
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-0689
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
Ubuntu USN