Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2009-0689 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Freebsd
Severity
6.8MEDIUMNVD
EPSS
41.8%
top 2.57%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJul 1
Latest updateMay 2
Description
Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large…
CVSS vector
AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4
Affected Packages5 packages
Also affects: Netbsd 5.0, Freebsd 6.4, 7.2
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
11📋Vendor Advisories
5💬Community
4Bugzilla▶
mono: Converting specially crafted string to float causes crash and possible code execution↗2015-12-22