Gentoo Archives: gentoo-announce

From: Pierre-Yves Rofes <py@g.o>
To: gentoo-announce@l.g.o
Cc: full-disclosure@××××××××××××××.uk, bugtraq@×××××××××××××.com, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200711-10 ] Mono: Buffer overflow
Date: Wed, 07 Nov 2007 23:16:09
Message-Id: 47324373.5070001@gentoo.org
1 -----BEGIN PGP SIGNED MESSAGE-----
2 Hash: SHA1
3
4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5 Gentoo Linux Security Advisory GLSA 200711-10
6 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7 http://security.gentoo.org/
8 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9
10 Severity: High
11 Title: Mono: Buffer overflow
12 Date: November 07, 2007
13 Bugs: #197067
14 ID: 200711-10
15
16 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
17
18 Synopsis
19 ========
20
21 Mono's BigInteger implementation contains a buffer overflow
22 vulnerability that might lead to the execution of arbitrary code.
23
24 Background
25 ==========
26
27 Mono provides the necessary software to develop and run .NET client and
28 server applications on various platforms.
29
30 Affected packages
31 =================
32
33 -------------------------------------------------------------------
34 Package / Vulnerable / Unaffected
35 -------------------------------------------------------------------
36 1 dev-lang/mono < 1.2.5.1-r1 >= 1.2.5.1-r1
37
38 Description
39 ===========
40
41 IOActive discovered an error in the Mono.Math.BigInteger class, in the
42 reduction step of the Montgomery-based Pow methods, that could lead to
43 a buffer overflow.
44
45 Impact
46 ======
47
48 A remote attacker could exploit this vulnerability by sending specially
49 crafted data to Mono applications using the BigInteger class, which
50 might lead to the execution of arbitrary code with the privileges of
51 the user running the application (possibly root) or a Denial of
52 Service.
53
54 Workaround
55 ==========
56
57 There is no known workaround at this time.
58
59 Resolution
60 ==========
61
62 All Mono users should upgrade to the latest version:
63
64 # emerge --sync
65 # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.2.5.1-r1"
66
67 References
68 ==========
69
70 [ 1 ] CVE-2007-5197
71 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5197
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200711-10.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2007 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.5
100 -----BEGIN PGP SIGNATURE-----
101 Version: GnuPG v1.4.7 (GNU/Linux)
102 Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
103
104 iD8DBQFHMkNzuhJ+ozIKI5gRArYjAJ9phAJywZIzP4gaojoMXPBM8GAFOwCgnT87
105 kIV5YdfDuYixkkHSy5ynoIk=
106 =Nk3F
107 -----END PGP SIGNATURE-----
108 --
109 gentoo-announce@g.o mailing list