CVE-2009-0323

Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable.  NOTE: these are different vectors than CVE-2008-6005.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
VendorProductVersion
w3amaya
𝑥
≤ 11.0
w3amaya
0.9
w3amaya
0.95b:b
w3amaya
1.0
w3amaya
1.0a:a
w3amaya
1.1
w3amaya
1.1a:a
w3amaya
1.1c:c
w3amaya
1.2
w3amaya
1.2a:a
w3amaya
1.3
w3amaya
1.3a:a
w3amaya
1.3b:b
w3amaya
1.4
w3amaya
1.4a:a
w3amaya
2.0
w3amaya
2.1
w3amaya
2.2
w3amaya
2.3
w3amaya
2.4
w3amaya
3.0
w3amaya
3.1
w3amaya
3.2
w3amaya
3.2.1
w3amaya
4.0
w3amaya
4.1
w3amaya
4.2
w3amaya
4.2.1
w3amaya
4.3
w3amaya
4.3.1
w3amaya
4.3.2
w3amaya
5.0
w3amaya
5.1
w3amaya
5.2
w3amaya
5.3
w3amaya
6.0
w3amaya
6.1
w3amaya
6.2
w3amaya
6.3
w3amaya
6.4
w3amaya
7.0
w3amaya
7.1
w3amaya
7.2
w3amaya
8.0
w3amaya
8.1
w3amaya
8.1a:a
w3amaya
8.1b:b
w3amaya
8.2
w3amaya
8.3
w3amaya
8.4
w3amaya
8.5
w3amaya
8.6
w3amaya
8.7
w3amaya
8.7.1
w3amaya
8.7.2
w3amaya
8.8.1
w3amaya
8.8.3
w3amaya
8.8.4
w3amaya
8.8.5
w3amaya
8.52
w3amaya
9.0
w3amaya
9.1
w3amaya
9.2.1
w3amaya
9.3
w3amaya
9.4
w3amaya
9.5
w3amaya
9.52
w3amaya
9.53
w3amaya
9.54
w3amaya
9.55
w3amaya
10.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
amaya
oneiric
dne
natty
dne
maverick
dne
lucid
dne
karmic
dne
jaunty
dne
intrepid
ignored
hardy
ignored
gutsy
ignored
dapper
ignored