Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html | |
http://secunia.com/advisories/40792 | Vendor Advisory |
http://secunia.com/secunia_research/2010-102/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2010-08-24 22:00
Updated : 2010-12-07 06:47
NVD link : CVE-2010-1526
Mitre link : CVE-2010-1526
CVE.ORG link : CVE-2010-1526
JSON object : View
Products Affected
mono-project
- libgdiplus
CWE
CWE-189
Numeric Errors