Vulnerability CVE-2010-4254


Published: 2010-12-06   Modified: 2012-02-13

Description:
Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call.

See advisories in our WLB2 database:
Topic
Author
Date
High
Mono/Moonlight Generic Type Argument Local Privilege Escalation
Chris Howie
15.01.2011

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Novell -> Moonlight 
MONO -> MONO 

 References:
https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac
https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358
https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399
https://bugzilla.novell.com/show_bug.cgi?id=655847
https://bugzilla.novell.com/show_bug.cgi?id=654136
http://www.vupen.com/english/advisories/2011/0076
http://www.securityfocus.com/bid/45051
http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability
http://www.exploit-db.com/exploits/15974
http://secunia.com/advisories/42877
http://secunia.com/advisories/42373
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html

Copyright 2024, cxsecurity.com

 

Back to Top