Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html | |
http://secunia.com/advisories/40792 | Vendor Advisory |
http://secunia.com/secunia_research/2010-102/ | Vendor Advisory |
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html | |
http://secunia.com/advisories/40792 | Vendor Advisory |
http://secunia.com/secunia_research/2010-102/ | Vendor Advisory |
Configurations
History
21 Nov 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html - | |
References | () http://secunia.com/advisories/40792 - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2010-102/ - Vendor Advisory |
Information
Published : 2010-08-24 22:00
Updated : 2024-11-21 01:14
NVD link : CVE-2010-1526
Mitre link : CVE-2010-1526
CVE.ORG link : CVE-2010-1526
JSON object : View
Products Affected
mono-project
- libgdiplus
CWE
CWE-189
Numeric Errors