Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
References
Link | Resource |
---|---|
http://secunia.com/secunia_research/2010-102/ | Vendor Advisory |
http://secunia.com/advisories/40792 | Vendor Advisory |
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html |
Configurations
Information
Published : 2010-08-24 15:00
Updated : 2010-12-06 22:47
NVD link : CVE-2010-1526
Mitre link : CVE-2010-1526
JSON object : View
CWE
CWE-189
Numeric Errors
Products Affected
mono-project
- libgdiplus