CVE-2009-0723

N/A Unknown
Published: March 23, 2009 Modified: April 23, 2026
View on NVD

Description

Multiple integer overflows in LittleCMS (aka lcms or liblcms) before 1.18beta2, as used in Firefox 3.1beta, OpenJDK, and GIMP, allow context-dependent attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow. NOTE: some of these details are obtained from third party information.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/34367
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34382
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34400
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34408
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34418
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34442
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34450
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34454
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34463
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34632
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34675
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/34782
Source: cve@mitre.org
Broken Link
http://security.gentoo.org/glsa/glsa-200904-19.xml
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2009/dsa-1745
Source: cve@mitre.org
Third Party Advisory
http://www.debian.org/security/2009/dsa-1769
Source: cve@mitre.org
Third Party Advisory
http://www.ocert.org/advisories/ocert-2009-003.html
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-0339.html
Source: cve@mitre.org
Broken Link Vendor Advisory
http://www.securityfocus.com/archive/1/502018/100/0/threaded
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/502031/100/0/threaded
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/34185
Source: cve@mitre.org
Broken Link Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021869
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-744-1
Source: cve@mitre.org
Third Party Advisory
http://www.vupen.com/english/advisories/2009/0775
Source: cve@mitre.org
Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=487508
Source: cve@mitre.org
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49326
Source: cve@mitre.org
Third Party Advisory VDB Entry
https://rhn.redhat.com/errata/RHSA-2009-0377.html
Source: cve@mitre.org
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://scary.beasts.org/security/CESA-2009-003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://scarybeastsecurity.blogspot.com/2009/03/littlecms-vulnerabilities.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/34367
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34382
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34400
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34408
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34418
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34442
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34450
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34454
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34463
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34632
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34675
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/34782
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200904-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.487438
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2009/dsa-1745
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2009/dsa-1769
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:121
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2009:137
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2009:162
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.ocert.org/advisories/ocert-2009-003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2009-0339.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://www.securityfocus.com/archive/1/502018/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/502031/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/34185
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1021869
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/USN-744-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2009/0775
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://bugzilla.redhat.com/show_bug.cgi?id=487508
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/49326
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
https://rhn.redhat.com/errata/RHSA-2009-0377.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00794.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00799.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00811.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00851.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00856.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00857.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2009-March/msg00921.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

82 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.9%
75th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

mozilla sun littlecms gimp