Array index error in dtoa implementation allows attackers to cause denial of service and possibly execute arbitrary code via large precision value in printf function, leading to heap-based buffer overflow in libc used in multiple products including FreeBSD, NetBSD, OpenBSD, Mozilla Firefox, K-Meleon and SeaMonkey
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | KDE KDELibs 4.3.3 - Remote Array Overrun | 19 Nov 200900:00 | – | exploitpack |
![]() | SeaMonkey 1.1.8 - Remote Array Overrun | 19 Nov 200900:00 | – | exploitpack |
![]() | Opera 10.01 - Remote Array Overrun | 19 Nov 200900:00 | – | exploitpack |
![]() | K-Meleon 1.5.3 - Remote Array Overrun | 19 Nov 200900:00 | – | exploitpack |
![]() | Sunbird 0.9 - Array Overrun Code Execution | 11 Dec 200900:00 | – | exploitpack |
![]() | K-Meleon 1.5.3 Remote Array Overrun (Arbitrary code execution) | 20 Nov 200900:00 | – | securityvulns |
![]() | Opera 10.01 Remote Array Overrun (Arbitrary code execution) | 20 Nov 200900:00 | – | securityvulns |
![]() | KDE KDELibs 4.3.3 Remote Array Overrun (Arbitrary code execution) | 20 Nov 200900:00 | – | securityvulns |
![]() | Firefox 3.5.3 Remote Array Overrun (UPDATE) | 20 Nov 200900:00 | – | securityvulns |
![]() | SeaMonkey 1.1.8 Remote Array Overrun (Arbitrary code execution) | 20 Nov 200900:00 | – | securityvulns |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo