First published: Wed Nov 17 2010(Updated: )
Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mono | <=2.6.7 | |
Mono | =1.0 | |
Mono | =1.0.1 | |
Mono | =1.0.2 | |
Mono | =1.0.4 | |
Mono | =1.0.5 | |
Mono | =1.0.6 | |
Mono | =1.1.1 | |
Mono | =1.1.2 | |
Mono | =1.1.3 | |
Mono | =1.1.4 | |
Mono | =1.1.5 | |
Mono | =1.1.6 | |
Mono | =1.1.7 | |
Mono | =1.1.8 | |
Mono | =1.1.8.1 | |
Mono | =1.1.8.3 | |
Mono | =1.1.9 | |
Mono | =1.1.9.1 | |
Mono | =1.1.9.2 | |
Mono | =1.1.10 | |
Mono | =1.1.10.1 | |
Mono | =1.1.11 | |
Mono | =1.1.12 | |
Mono | =1.1.12.1 | |
Mono | =1.1.13 | |
Mono | =1.1.13.2 | |
Mono | =1.1.13.4 | |
Mono | =1.1.13.5 | |
Mono | =1.1.13.6 | |
Mono | =1.1.13.7 | |
Mono | =1.1.13.8 | |
Mono | =1.1.13.8.1 | |
Mono | =1.1.14 | |
Mono | =1.1.15 | |
Mono | =1.1.16 | |
Mono | =1.1.16.1 | |
Mono | =1.1.17 | |
Mono | =1.1.17.1 | |
Mono | =1.1.17.2 | |
Mono | =1.1.18 | |
Mono | =1.2 | |
Mono | =1.2.1 | |
Mono | =1.2.2 | |
Mono | =1.2.2.1 | |
Mono | =1.2.3 | |
Mono | =1.2.3.1 | |
Mono | =1.2.4 | |
Mono | =1.2.5 | |
Mono | =1.2.5.1 | |
Mono | =1.2.5.2 | |
Mono | =1.2.6 | |
Mono | =1.9 | |
Mono | =1.9.1 | |
Mono | =2.0 | |
Mono | =2.0.1 | |
Mono | =2.2 | |
Mono | =2.4 | |
Mono | =2.4.2 | |
Mono | =2.4.2.1 | |
Mono | =2.4.2.2 | |
Mono | =2.4.2.3 | |
Mono | =2.4.3 | |
Mono | =2.6 | |
Mono | =2.6.3 | |
Mono | =2.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-4159 is considered to be a medium severity vulnerability due to its potential to allow privilege escalation.
To fix CVE-2010-4159, you should upgrade to a version of Mono later than 2.6.7, where the vulnerability is mitigated.
CVE-2010-4159 affects Mono versions 2.8 and earlier, including all versions up to 2.6.7.
CVE-2010-4159 can be exploited by local users who have access to the current working directory.
CVE-2010-4159 is classified as an untrusted search path vulnerability, enabling the execution of a Trojan horse shared library.