Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2009-0733
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
Multiple stack-based buffer overflows in the ReadSetOfCurves function in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel, related to the ReadLUT_A2B and ReadLUT_B2A functions..
CVSSv2.0 Score
- Severity
- High
- Base Score
- 9.3/10
- Exploit Score
- 8.6/10
- Access Vector
- Network
- Access Complexity
- Medium
- Authentication Required
- None
- Impact Score
- 10/10
- Confidentiality Impact
- Complete
- Availability Impact
- Complete
- Integrity Impact
- Complete
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:mozilla:firefox:3.1:beta1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:sun:openjdk:*:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:littlecms:little_cms:*:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=487512
- http://www.redhat.com/support/errata/RHSA-2009-0339.html
- http://scary.beasts.org/security/CESA-2009-003.html
- http://www.securityfocus.com/bid/34185
- http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html
- http://www.vupen.com/english/advisories/2009/0775
- http://secunia.com/advisories/34400
- http://www.ubuntu.com/usn/USN-744-1
- http://secunia.com/advisories/34367
- http://www.ocert.org/advisories/ocert-2009-003.html
- http://secunia.com/advisories/34382
- http://www.debian.org/security/2009/dsa-1745
- http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
- http://secunia.com/advisories/34418
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html
- http://secunia.com/advisories/34450
- http://secunia.com/advisories/34454
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html
- http://www.securitytracker.com/id?1021869
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html
- http://secunia.com/advisories/34442
- http://secunia.com/advisories/34408
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html
- http://secunia.com/advisories/34463
- http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-securit
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html
- https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html
- https://rhn.redhat.com/errata/RHSA-2009-0377.html
- http://secunia.com/advisories/34675
- http://www.debian.org/security/2009/dsa-1769
- http://secunia.com/advisories/34632
- http://security.gentoo.org/glsa/glsa-200904-19.xml
- http://secunia.com/advisories/34782
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:121
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49330
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9
- http://www.securityfocus.com/archive/1/502031/100/0/threaded
- http://www.securityfocus.com/archive/1/502018/100/0/threaded