{"api_version":"1","generated_at":"2026-04-23T12:50:13+00:00","cve":"CVE-2009-4012","urls":{"html":"https://cve.report/CVE-2009-4012","api":"https://cve.report/api/cve/CVE-2009-4012.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2009-4012","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2009-4012"},"summary":{"title":"CVE-2009-4012","description":"Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c.  NOTE: some of these details are obtained from third party information.","state":"PUBLISHED","assigner":"mitre","published_at":"2010-01-19 16:30:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-189","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://linux.thai.net/node/184","name":"http://linux.thai.net/node/184","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"LibThai 0.1.13 Released | LTN -- linux.thai.net","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2010/dsa-1971","name":"http://www.debian.org/security/2010/dsa-1971","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Debian -- Security Information -- DSA-1971-1 libthai","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html","name":"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"[security-announce] SUSE Security Summary Report: SUSE-SR:2010:002","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/38235","name":"http://secunia.com/advisories/38235","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Ubuntu update for libthai - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/38196","name":"http://secunia.com/advisories/38196","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"libthai Integer Overflow Vulnerabilities - Secunia Advisories - Vulnerability Information - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://ubuntu.com/usn/usn-887-1","name":"http://ubuntu.com/usn/usn-887-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"USN-887-1: LibThai vulnerability | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.9-4+lenny1.diff.gz","name":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.9-4+lenny1.diff.gz","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"404 Not Found","mime":"application/gzip","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/37822","name":"http://www.securityfocus.com/bid/37822","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"LibThai Unspecified Integer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://linux.thai.net/svn/software/libthai/tags/r_0_1_13/ChangeLog","name":"http://linux.thai.net/svn/software/libthai/tags/r_0_1_13/ChangeLog","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Page not found | LTN -- linux.thai.net","mime":"text/plain","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/38213","name":"http://secunia.com/advisories/38213","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Debian update for libthai - Secunia Advisories - Vulnerability Information - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.6-1+etch1.diff.gz","name":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.6-1+etch1.diff.gz","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"404 Not Found","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"http://secunia.com/advisories/38420","name":"http://secunia.com/advisories/38420","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SUSE Update for Multiple Packages - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2009-4012","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-4012","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.11","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.8","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"0.1.9","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2009","cve_id":"4012","vulnerable":"1","versionEndIncluding":"0.1.12","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"linux.thai","cpe5":"libthai","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T06:45:50.921Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"38213","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38213"},{"name":"38235","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38235"},{"name":"DSA-1971","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2010/dsa-1971"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.6-1+etch1.diff.gz"},{"name":"USN-887-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://ubuntu.com/usn/usn-887-1"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://linux.thai.net/svn/software/libthai/tags/r_0_1_13/ChangeLog"},{"name":"38196","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38196"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.9-4+lenny1.diff.gz"},{"name":"SUSE-SR:2010:002","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://linux.thai.net/node/184"},{"name":"37822","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/37822"},{"name":"38420","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/38420"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2010-01-15T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c.  NOTE: some of these details are obtained from third party information."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2010-03-04T10:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"38213","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38213"},{"name":"38235","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38235"},{"name":"DSA-1971","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2010/dsa-1971"},{"tags":["x_refsource_CONFIRM"],"url":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.6-1+etch1.diff.gz"},{"name":"USN-887-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://ubuntu.com/usn/usn-887-1"},{"tags":["x_refsource_CONFIRM"],"url":"http://linux.thai.net/svn/software/libthai/tags/r_0_1_13/ChangeLog"},{"name":"38196","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38196"},{"tags":["x_refsource_CONFIRM"],"url":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.9-4+lenny1.diff.gz"},{"name":"SUSE-SR:2010:002","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://linux.thai.net/node/184"},{"name":"37822","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/37822"},{"name":"38420","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/38420"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2009-4012","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c.  NOTE: some of these details are obtained from third party information."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"38213","refsource":"SECUNIA","url":"http://secunia.com/advisories/38213"},{"name":"38235","refsource":"SECUNIA","url":"http://secunia.com/advisories/38235"},{"name":"DSA-1971","refsource":"DEBIAN","url":"http://www.debian.org/security/2010/dsa-1971"},{"name":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.6-1+etch1.diff.gz","refsource":"CONFIRM","url":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.6-1+etch1.diff.gz"},{"name":"USN-887-1","refsource":"UBUNTU","url":"http://ubuntu.com/usn/usn-887-1"},{"name":"http://linux.thai.net/svn/software/libthai/tags/r_0_1_13/ChangeLog","refsource":"CONFIRM","url":"http://linux.thai.net/svn/software/libthai/tags/r_0_1_13/ChangeLog"},{"name":"38196","refsource":"SECUNIA","url":"http://secunia.com/advisories/38196"},{"name":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.9-4+lenny1.diff.gz","refsource":"CONFIRM","url":"http://security.debian.org/pool/updates/main/libt/libthai/libthai_0.1.9-4+lenny1.diff.gz"},{"name":"SUSE-SR:2010:002","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00000.html"},{"name":"http://linux.thai.net/node/184","refsource":"CONFIRM","url":"http://linux.thai.net/node/184"},{"name":"37822","refsource":"BID","url":"http://www.securityfocus.com/bid/37822"},{"name":"38420","refsource":"SECUNIA","url":"http://secunia.com/advisories/38420"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2009-4012","datePublished":"2010-01-19T16:00:00.000Z","dateReserved":"2009-11-19T00:00:00.000Z","dateUpdated":"2024-08-07T06:45:50.921Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2010-01-19 16:30:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-189","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:*:*:*:*:*:*:*:*","versionEndIncluding":"0.1.12","matchCriteriaId":"175C41F0-0AE1-4988-B578-7F2FA5D8D226"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.0:*:*:*:*:*:*:*","matchCriteriaId":"AC09407C-A17B-4352-95C1-4DE5AFDBA50A"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.1:*:*:*:*:*:*:*","matchCriteriaId":"1A44B598-6C1C-4F36-8D0B-8490DF19B8F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.2:*:*:*:*:*:*:*","matchCriteriaId":"D2F713E2-60CF-43B3-BE0A-7E27ACB8CF43"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2C589B35-D04B-475D-92C1-43119F7E1D02"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.4:*:*:*:*:*:*:*","matchCriteriaId":"906F252C-A50B-47E4-AA46-944EA8387C67"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F5947FE7-2AFF-4993-A4EA-4C55572313C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.6:*:*:*:*:*:*:*","matchCriteriaId":"61AEC947-09BD-4C27-B98B-4BDBB54162EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.7:*:*:*:*:*:*:*","matchCriteriaId":"51B63F91-BDE7-4210-8461-2A64C128E723"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.8:*:*:*:*:*:*:*","matchCriteriaId":"C9BE9DC1-EE8D-42CF-92CE-D587527EE31F"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.9:*:*:*:*:*:*:*","matchCriteriaId":"011702A6-9E15-48A4-8403-85FBE5DC5F77"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.10:*:*:*:*:*:*:*","matchCriteriaId":"D8075A59-71F3-4B62-A12C-E0B7EFA36B76"},{"vulnerable":true,"criteria":"cpe:2.3:a:linux.thai:libthai:0.1.11:*:*:*:*:*:*:*","matchCriteriaId":"230F57D9-B54A-43E3-BFBD-6FA4A38E9F74"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2009","CveId":"4012","Ordinal":"1","Title":"CVE-2009-4012","CVE":"CVE-2009-4012","Year":"2009"},"notes":[{"CveYear":"2009","CveId":"4012","Ordinal":"1","NoteData":"Multiple integer overflows in LibThai before 0.1.13 might allow context-dependent attackers to execute arbitrary code via long strings that trigger heap-based buffer overflows, related to (1) thbrk/thbrk.c and (2) thwbrk/thwbrk.c.  NOTE: some of these details are obtained from third party information.","Type":"Description","Title":"CVE-2009-4012"},{"CveYear":"2009","CveId":"4012","Ordinal":"2","NoteData":"2010-01-19","Type":"Other","Title":"Published"},{"CveYear":"2009","CveId":"4012","Ordinal":"3","NoteData":"2010-03-04","Type":"Other","Title":"Modified"}]}}}