Lucene search

K
gentooGentoo FoundationGLSA-200711-10
HistoryNov 07, 2007 - 12:00 a.m.

Mono: Buffer overflow

2007-11-0700:00:00
Gentoo Foundation
security.gentoo.org
17

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

89.0%

Background

Mono provides the necessary software to develop and run .NET client and server applications on various platforms.

Description

IOActive discovered an error in the Mono.Math.BigInteger class, in the reduction step of the Montgomery-based Pow methods, that could lead to a buffer overflow.

Impact

A remote attacker could exploit this vulnerability by sending specially crafted data to Mono applications using the BigInteger class, which might lead to the execution of arbitrary code with the privileges of the user running the application (possibly root) or a Denial of Service.

Workaround

There is no known workaround at this time.

Resolution

All Mono users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.2.5.1-r1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-lang/mono<Β 1.2.5.1-r1UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.02 Low

EPSS

Percentile

89.0%