Executive Summary

Informations
Name CVE-2010-4254 First vendor Publication 2010-12-06
Vendor Cve Last vendor Modification 2011-02-02

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4254

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1
Application 7

OpenVAS Exploits

Date Description
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-13 (mono mono-debugger)
File : nvt/glsa_201206_13.nasl
2011-04-01 Name : Fedora Update for mono-addins FEDORA-2011-3393
File : nvt/gb_fedora_2011_3393_mono-addins_fc14.nasl
2011-04-01 Name : Fedora Update for mono FEDORA-2011-3393
File : nvt/gb_fedora_2011_3393_mono_fc14.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
69619 Mono on Moonlight Unspecified Generic Constraints Bypass

Mono on Moonlight contains a flaw related to insufficient validation of arguments. The issue is triggered when remote attacker uses a crafted method call to bypass security policies or potentially execute arbitrary code.

Nessus® Vulnerability Scanner

Date Description
2014-06-13 Name : The remote openSUSE host is missing a security update.
File : suse_11_3_libmoon-devel-101208.nasl - Type : ACT_GATHER_INFO
2012-06-22 Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201206-13.nasl - Type : ACT_GATHER_INFO
2011-04-01 Name : The remote Fedora host is missing one or more security updates.
File : fedora_2011-3393.nasl - Type : ACT_GATHER_INFO
2011-01-21 Name : The remote SuSE 11 host is missing one or more security updates.
File : suse_11_libmoon-devel-101222.nasl - Type : ACT_GATHER_INFO
2011-01-21 Name : The remote SuSE 11 host is missing a security update.
File : suse_11_moonlight-plugin-101130.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/45051
CONFIRM http://www.mono-project.com/Vulnerabilities#Moonlight_Generic_Constraints_Byp...
https://bugzilla.novell.com/show_bug.cgi?id=654136
https://bugzilla.novell.com/show_bug.cgi?id=655847
https://github.com/mono/mono/commit/4905ef1130feb26c3150b28b97e4a96752e0d399
https://github.com/mono/mono/commit/65292a69c837b8a5f7a392d34db63de592153358
https://github.com/mono/mono/commit/cf1ec146f7c6acdc6697032b3aaafc68ffacdcac
EXPLOIT-DB http://www.exploit-db.com/exploits/15974
SECUNIA http://secunia.com/advisories/42373
http://secunia.com/advisories/42877
SUSE http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00006.html
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00003.html
VUPEN http://www.vupen.com/english/advisories/2011/0076

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
Date Informations
2020-05-23 01:43:03
  • Multiple Updates
2020-05-23 00:26:55
  • Multiple Updates
2016-04-26 20:14:20
  • Multiple Updates
2014-06-14 13:29:46
  • Multiple Updates
2014-02-17 10:58:37
  • Multiple Updates
2013-05-10 23:36:54
  • Multiple Updates