Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:20
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html - | |
References | () http://secunia.com/advisories/42373 - Vendor Advisory | |
References | () http://secunia.com/advisories/42877 - | |
References | () http://www.exploit-db.com/exploits/15974 - | |
References | () http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Bypass_Vulnerability - | |
References | () http://www.securityfocus.com/bid/45051 - | |
References | () http://www.vupen.com/english/advisories/2011/0076 - | |
References | () https://bugzilla.novell.com/show_bug.cgi?id=654136 - | |
References | () https://bugzilla.novell.com/show_bug.cgi?id=655847 - | |
References | () https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399 - Patch | |
References | () https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358 - Patch | |
References | () https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac - Patch |
Information
Published : 2010-12-06 13:44
Updated : 2024-11-21 01:20
NVD link : CVE-2010-4254
Mitre link : CVE-2010-4254
CVE.ORG link : CVE-2010-4254
JSON object : View
Products Affected
novell
- moonlight
mono
- mono
CWE
CWE-20
Improper Input Validation