Vulnerability Description
Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mono-Project | Libgdiplus | 2.6.7 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
- http://secunia.com/advisories/40792Vendor Advisory
- http://secunia.com/secunia_research/2010-102/Vendor Advisory
- http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
- http://secunia.com/advisories/40792Vendor Advisory
- http://secunia.com/secunia_research/2010-102/Vendor Advisory
FAQ
What is CVE-2010-1526?
CVE-2010-1526 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2)...
How severe is CVE-2010-1526?
CVE-2010-1526 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1526?
Check the references section above for vendor advisories and patch information. Affected products include: Mono-Project Libgdiplus.