6.8
CVSSv2

CVE-2010-1526

Published: 24/08/2010 Updated: 07/12/2010
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow malicious users to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.

Vulnerable Product Search on Vulmon Subscribe to Product

mono-project libgdiplus 2.6.7

Vendor Advisories

Debian Bug report logs - #594155 CVE-2010-1526: overflows in TIFF, JPEG, DIP decoding Package: libgdiplus; Maintainer for libgdiplus is Debian Mono Group <pkg-mono-group@listsaliothdebianorg>; Source for libgdiplus is src:libgdiplus (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Tue, 24 ...
Stefan Cornelius discovered that libgdiplus incorrectly handled certain image files If a user or automated system were tricked into opening a crafted image file, an attacker could cause a denial of service or possibly execute arbitrary code with the privileges of the user invoking the program ...