CVE-2011-0990
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Race condition in the FastCopy optimization in the Array.Copy method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to trigger a buffer overflow and modify internal data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file in which a thread makes a change after a type check but before a copy action.
Condición de carrera en la optimización de FastCopy en el método Array.Copy en metadata/icall.c de Mono, cuando se utiliza Moonlight 2.x anterior a 2.4.1 o 3.x anterior a 3.99.3, permite a atacantes remotos provocar un desbordamiento del búfer y modificar las estructuras internas de datos, también permite provocar una denegación de servicio (caída del plugin) o corromper el estado interno del gestor de seguridad mediante un fichero media manipulado, en el que un hilo realiza un cambio después de una comprobación de escritura pero antes de una acción de copiado.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-02-14 CVE Reserved
- 2011-04-13 CVE Published
- 2023-12-02 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2011-04/msg00024.html | Mailing List | |
http://www.mono-project.com/Vulnerabilities | X_refsource_confirm | |
http://www.securityfocus.com/bid/47208 | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/66625 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://openwall.com/lists/oss-security/2011/04/06/14 | 2017-08-17 | |
https://bugzilla.novell.com/show_bug.cgi?id=667077 | 2017-08-17 | |
https://github.com/mono/mono/commit/2f00e4bbb2137130845afb1b2a1e678552fc8e5c | 2017-08-17 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/44002 | 2017-08-17 | |
http://secunia.com/advisories/44076 | 2017-08-17 | |
http://www.vupen.com/english/advisories/2011/0904 | 2017-08-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mono Search vendor "Mono" | Mono Search vendor "Mono" for product "Mono" | * | - |
Affected
| ||||||
Novell Search vendor "Novell" | Moonlight Search vendor "Novell" for product "Moonlight" | 2.0 Search vendor "Novell" for product "Moonlight" and version "2.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Moonlight Search vendor "Novell" for product "Moonlight" | 2.3.0 Search vendor "Novell" for product "Moonlight" and version "2.3.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Moonlight Search vendor "Novell" for product "Moonlight" | 2.4 Search vendor "Novell" for product "Moonlight" and version "2.4" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Moonlight Search vendor "Novell" for product "Moonlight" | 2.31 Search vendor "Novell" for product "Moonlight" and version "2.31" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Moonlight Search vendor "Novell" for product "Moonlight" | 3.0 Search vendor "Novell" for product "Moonlight" and version "3.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Moonlight Search vendor "Novell" for product "Moonlight" | 3.99 Search vendor "Novell" for product "Moonlight" and version "3.99" | - |
Affected
|