CVE-2009-0323

EUVD-2009-0327
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable.  NOTE: these are different vectors than CVE-2008-6005.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
10 UNKNOWN
NETWORK
LOW
AV:N/AC:L/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
w3amaya
𝑥
≤ 11.0
w3amaya
0.9
w3amaya
0.95b:b
w3amaya
1.0
w3amaya
1.0a:a
w3amaya
1.1
w3amaya
1.1a:a
w3amaya
1.1c:c
w3amaya
1.2
w3amaya
1.2a:a
w3amaya
1.3
w3amaya
1.3a:a
w3amaya
1.3b:b
w3amaya
1.4
w3amaya
1.4a:a
w3amaya
2.0
w3amaya
2.1
w3amaya
2.2
w3amaya
2.3
w3amaya
2.4
w3amaya
3.0
w3amaya
3.1
w3amaya
3.2
w3amaya
3.2.1
w3amaya
4.0
w3amaya
4.1
w3amaya
4.2
w3amaya
4.2.1
w3amaya
4.3
w3amaya
4.3.1
w3amaya
4.3.2
w3amaya
5.0
w3amaya
5.1
w3amaya
5.2
w3amaya
5.3
w3amaya
6.0
w3amaya
6.1
w3amaya
6.2
w3amaya
6.3
w3amaya
6.4
w3amaya
7.0
w3amaya
7.1
w3amaya
7.2
w3amaya
8.0
w3amaya
8.1
w3amaya
8.1a:a
w3amaya
8.1b:b
w3amaya
8.2
w3amaya
8.3
w3amaya
8.4
w3amaya
8.5
w3amaya
8.6
w3amaya
8.7
w3amaya
8.7.1
w3amaya
8.7.2
w3amaya
8.8.1
w3amaya
8.8.3
w3amaya
8.8.4
w3amaya
8.8.5
w3amaya
8.52
w3amaya
9.0
w3amaya
9.1
w3amaya
9.2.1
w3amaya
9.3
w3amaya
9.4
w3amaya
9.5
w3amaya
9.52
w3amaya
9.53
w3amaya
9.54
w3amaya
9.55
w3amaya
10.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
amaya
dapper
ignored
gutsy
ignored
hardy
ignored
intrepid
ignored
jaunty
dne
karmic
dne
lucid
dne
maverick
dne
natty
dne
oneiric
dne