[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1NHeKj-00073y-3n@titan.mandriva.com>
Date: Mon, 07 Dec 2009 15:13:01 +0100
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2009:322 ] mono
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:322
http://www.mandriva.com/security/
_______________________________________________________________________
Package : mono
Date : December 7, 2009
Affected: 2008.0
_______________________________________________________________________
Problem Description:
Multiple vulnerabilities has been found and corrected in mono:
IOActive Inc. found a buffer overflow in Mono.Math.BigInteger class
in Mono 1.2.5.1 and previous versions, which allows arbitrary code
execution by context-dependent attackers (CVE-2007-5197).
Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net
class libraries in Mono 2.0 and earlier allow remote attackers to
inject arbitrary web script or HTML via crafted attributes related to
(1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs
(RenderAttributes), (3) HtmlInputButton (RenderAttributes),
(4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect
(RenderChildren) (CVE-2008-3422).
CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows
remote attackers to inject arbitrary HTTP headers and conduct HTTP
response splitting attacks via CRLF sequences in the query string
(CVE-2008-3906).
The XML HMAC signature system did not correctly check certain
lengths. If an attacker sent a truncated HMAC, it could bypass
authentication, leading to potential privilege escalation
(CVE-2009-0217).
Packages for 2008.0 are being provided due to extended support for
Corporate products.
The updated packages have been patched to fix these issues.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5197
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3422
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3906
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.0:
e5c940429fe7037f4f221b9ff9b620a8 2008.0/i586/jay-1.2.5-2.1mdv2008.0.i586.rpm
83bfd0d6029b4516368760355f9a3fae 2008.0/i586/libmono0-1.2.5-2.1mdv2008.0.i586.rpm
c697f55883457b7c5dda12e8dedc4c23 2008.0/i586/libmono-devel-1.2.5-2.1mdv2008.0.i586.rpm
cbd608614df82586614b206f9709de9d 2008.0/i586/mono-1.2.5-2.1mdv2008.0.i586.rpm
8b4ef19f16d5679883d9c91417082432 2008.0/i586/mono-bytefx-data-mysql-1.2.5-2.1mdv2008.0.i586.rpm
43b5b8085bbdebae15c5bb661f24d571 2008.0/i586/mono-data-1.2.5-2.1mdv2008.0.i586.rpm
6589c6caed4e5bd51c1c57e2a83fa44e 2008.0/i586/mono-data-firebird-1.2.5-2.1mdv2008.0.i586.rpm
61d214672724f684167ca8925f91eb14 2008.0/i586/mono-data-oracle-1.2.5-2.1mdv2008.0.i586.rpm
d519b2cc63be3a76a4d93c058ef86d7e 2008.0/i586/mono-data-postgresql-1.2.5-2.1mdv2008.0.i586.rpm
805e1400678166f533b68ad0a71463b7 2008.0/i586/mono-data-sqlite-1.2.5-2.1mdv2008.0.i586.rpm
b63a15e023653794d41995d3428b6def 2008.0/i586/mono-data-sybase-1.2.5-2.1mdv2008.0.i586.rpm
4a6f56fd50bcab6a8f1cbecd461b2096 2008.0/i586/mono-doc-1.2.5-2.1mdv2008.0.i586.rpm
db36927b07892c1c3e9241685ed1eb72 2008.0/i586/mono-extras-1.2.5-2.1mdv2008.0.i586.rpm
6d97a27aea0d59926f202830d6be327b 2008.0/i586/mono-ibm-data-db2-1.2.5-2.1mdv2008.0.i586.rpm
c52e7a85ad7540b6972d7b1f6eb44f66 2008.0/i586/mono-jscript-1.2.5-2.1mdv2008.0.i586.rpm
5e3266cd728afc4e0e093677bf0d6f06 2008.0/i586/mono-locale-extras-1.2.5-2.1mdv2008.0.i586.rpm
5b535b4ad9940b60249db9f0b3248d30 2008.0/i586/mono-nunit-1.2.5-2.1mdv2008.0.i586.rpm
e170547fede941d174523b3f7a56a77c 2008.0/i586/mono-web-1.2.5-2.1mdv2008.0.i586.rpm
5966cfb191906c938c493e04d05ef6eb 2008.0/i586/mono-winforms-1.2.5-2.1mdv2008.0.i586.rpm
00960df0d4057913baeca6ee30d262f7 2008.0/SRPMS/mono-1.2.5-2.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64:
7bdcf980d29e32a1c3d3108ad07a05b5 2008.0/x86_64/jay-1.2.5-2.1mdv2008.0.x86_64.rpm
dd6ba52cdb6aa3a8d9ee384622f0ab7d 2008.0/x86_64/lib64mono0-1.2.5-2.1mdv2008.0.x86_64.rpm
2d166512a5a4fecb1512142cc3a1161c 2008.0/x86_64/lib64mono-devel-1.2.5-2.1mdv2008.0.x86_64.rpm
a5082a80792cb6d7b50edd0313abebb4 2008.0/x86_64/mono-1.2.5-2.1mdv2008.0.x86_64.rpm
6199637cffce64193730e1a6fa6a97e7 2008.0/x86_64/mono-bytefx-data-mysql-1.2.5-2.1mdv2008.0.x86_64.rpm
bc9665adbb048a4c2bc1f094b46ce7e0 2008.0/x86_64/mono-data-1.2.5-2.1mdv2008.0.x86_64.rpm
26f805cadf4af5527f65802b17649288 2008.0/x86_64/mono-data-firebird-1.2.5-2.1mdv2008.0.x86_64.rpm
a4efe31e57602a183650084f00eef262 2008.0/x86_64/mono-data-oracle-1.2.5-2.1mdv2008.0.x86_64.rpm
864309bb2442e9bd916e23297e092e5b 2008.0/x86_64/mono-data-postgresql-1.2.5-2.1mdv2008.0.x86_64.rpm
55f04a44471401385ce1dc9228c6655a 2008.0/x86_64/mono-data-sqlite-1.2.5-2.1mdv2008.0.x86_64.rpm
566e4409cfdd23f02f39b01a93eb8bc9 2008.0/x86_64/mono-data-sybase-1.2.5-2.1mdv2008.0.x86_64.rpm
d092d711a298a5578c5e9f285cede2df 2008.0/x86_64/mono-doc-1.2.5-2.1mdv2008.0.x86_64.rpm
7e61c5cc2a4f08e5d0654072279e6061 2008.0/x86_64/mono-extras-1.2.5-2.1mdv2008.0.x86_64.rpm
ea7a03fd1821ee8ab48887ba5a14d555 2008.0/x86_64/mono-ibm-data-db2-1.2.5-2.1mdv2008.0.x86_64.rpm
ca24a0f2765bdc76077659549029f2ef 2008.0/x86_64/mono-jscript-1.2.5-2.1mdv2008.0.x86_64.rpm
e19f5600eba7bc7e12404c39bb9e9203 2008.0/x86_64/mono-locale-extras-1.2.5-2.1mdv2008.0.x86_64.rpm
3f63d60a6b2c1a3a2a9a524496643a6d 2008.0/x86_64/mono-nunit-1.2.5-2.1mdv2008.0.x86_64.rpm
d24d7c55ba6d5dd845b20d2d526dfa7a 2008.0/x86_64/mono-web-1.2.5-2.1mdv2008.0.x86_64.rpm
08846051c6dc2411f9c6535d2ad9e7eb 2008.0/x86_64/mono-winforms-1.2.5-2.1mdv2008.0.x86_64.rpm
00960df0d4057913baeca6ee30d262f7 2008.0/SRPMS/mono-1.2.5-2.1mdv2008.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFLHOIgmqjQ0CJFipgRApJJAKClsmLYTzWKSVNIs2mFPfXgSeoIAgCfaAj7
1KnMWylh5i2VskZO976EvIs=
=WbOA
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists