{
  "threat_severity" : "Critical",
  "public_date" : "2009-11-20T00:00:00Z",
  "bugzilla" : {
    "description" : "array index error in dtoa implementation of many products",
    "id" : "539784",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=539784"
  },
  "cvss" : {
    "cvss_base_score" : "6.8",
    "cvss_scoring_vector" : "AV:N/AC:M/Au:N/C:P/I:P/A:P",
    "status" : "verified"
  },
  "details" : [ "Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 3",
    "release_date" : "2009-10-27T00:00:00Z",
    "advisory" : "RHSA-2009:1531",
    "cpe" : "cpe:/o:redhat:enterprise_linux:3",
    "package" : "seamonkey-0:1.0.9-0.47.el3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2009-10-27T00:00:00Z",
    "advisory" : "RHSA-2009:1530",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "firefox-0:3.0.15-3.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2009-10-27T00:00:00Z",
    "advisory" : "RHSA-2009:1530",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "nspr-0:4.7.6-1.el4_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2009-10-27T00:00:00Z",
    "advisory" : "RHSA-2009:1531",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "seamonkey-0:1.0.9-50.el4_8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2009-11-24T00:00:00Z",
    "advisory" : "RHSA-2009:1601",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "kdelibs-6:3.3.1-17.el4_8.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2010-03-17T00:00:00Z",
    "advisory" : "RHSA-2010:0154",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "thunderbird-0:1.5.0.12-25.el4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2009-10-27T00:00:00Z",
    "advisory" : "RHSA-2009:1530",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "firefox-0:3.0.15-3.el5_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2009-10-27T00:00:00Z",
    "advisory" : "RHSA-2009:1530",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "nspr-0:4.7.6-1.el5_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2009-10-27T00:00:00Z",
    "advisory" : "RHSA-2009:1530",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "xulrunner-0:1.9.0.15-3.el5_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2009-11-24T00:00:00Z",
    "advisory" : "RHSA-2009:1601",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "kdelibs-6:3.5.4-25.el5_4.1"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2010-03-17T00:00:00Z",
    "advisory" : "RHSA-2010:0153",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "thunderbird-0:2.0.0.24-2.el5_4"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "release_date" : "2014-03-18T00:00:00Z",
    "advisory" : "RHSA-2014:0311",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5",
    "package" : "php-0:5.1.6-44.el5_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.3 Long Life",
    "release_date" : "2014-03-18T00:00:00Z",
    "advisory" : "RHSA-2014:0312",
    "cpe" : "cpe:/o:redhat:rhel_mission_critical:5.3",
    "package" : "php-0:5.1.6-23.6.el5_3"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.6 Long Life",
    "release_date" : "2014-03-18T00:00:00Z",
    "advisory" : "RHSA-2014:0312",
    "cpe" : "cpe:/o:redhat:rhel_mission_critical:5.6",
    "package" : "php-0:5.1.6-27.el5_6.7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5.9 Extended Update Support",
    "release_date" : "2014-03-18T00:00:00Z",
    "advisory" : "RHSA-2014:0312",
    "cpe" : "cpe:/o:redhat:rhel_eus:5.9",
    "package" : "php-0:5.1.6-40.el5_9.2"
  } ],
  "package_state" : [ {
    "product_name" : "OpenShift Enterprise 1",
    "fix_state" : "Affected",
    "package_name" : "js",
    "cpe" : "cpe:/a:redhat:openshift:1"
  }, {
    "product_name" : "Red Hat OpenShift Enterprise 2",
    "fix_state" : "Affected",
    "package_name" : "js",
    "cpe" : "cpe:/a:redhat:openshift:2"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2009-0689\nhttps://nvd.nist.gov/vuln/detail/CVE-2009-0689" ],
  "name" : "CVE-2009-0689",
  "csaw" : false
}