CVE-2009-0323
W3C Amaya Web Browser <11.0 - RCE
Title source: llmDescription
Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote attackers to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.
Exploits (3)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/16548
exploitdb
WRITEUP
VERIFIED
by Core Security · textdoswindows
https://www.exploit-db.com/exploits/7902
metasploit
WORKING POC
NORMAL
by dookie, original exploit by Rob Carter · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/amaya_bdo.rb
References (4)
Scores
EPSS
0.7354
EPSS Percentile
98.8%
Details
CWE
CWE-119
Status
published
Products (50)
w3/amaya
0.9
w3/amaya
0.95b
w3/amaya
1.0
w3/amaya
1.0a
w3/amaya
1.1
w3/amaya
1.1a
w3/amaya
1.1c
w3/amaya
1.2
w3/amaya
1.2a
w3/amaya
1.3
... and 40 more
Published
Jan 28, 2009
Tracked Since
Feb 18, 2026