CVE-2009-0323
Severity CVSS v4.0:
Pending analysis
Type:
CWE-119
Buffer Errors
Publication date:
28/01/2009
Last modified:
09/04/2025
Description
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:w3:amaya:*:*:*:*:*:*:*:* | 11.0 (including) | |
cpe:2.3:a:w3:amaya:0.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:0.95b:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.0a:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.1a:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.1c:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.2a:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.3a:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.3b:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:w3:amaya:1.4a:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.coresecurity.com/content/amaya-buffer-overflows
- http://www.securityfocus.com/archive/1/500492/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48325
- https://www.exploit-db.com/exploits/7902
- http://www.coresecurity.com/content/amaya-buffer-overflows
- http://www.securityfocus.com/archive/1/500492/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48325
- https://www.exploit-db.com/exploits/7902