First published: Wed Apr 13 2011(Updated: )
Use-after-free vulnerability in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, allows remote attackers to cause a denial of service (plugin crash) or obtain sensitive information via vectors related to member data in a resurrected MonoThread instance.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moonlight | =3.0 | |
Moonlight | =2.4 | |
Moonlight | =2.31 | |
Moonlight | =3.99 | |
Mono | ||
Moonlight | =2.3.0 | |
Moonlight | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0992 has a medium severity rating due to its potential for denial of service and data exposure.
To fix CVE-2011-0992, update your Novell Moonlight or Mono to the latest stable version that is not vulnerable.
CVE-2011-0992 affects Moonlight versions 2.0 to 2.4.1 and 3.x up to 3.99.3.
CVE-2011-0992 can be exploited through remote attacks that cause a plugin crash or leak sensitive information.
Yes, CVE-2011-0992 is a remote vulnerability that allows attackers to manipulate the Mono environment without physical access.