CVE-2011-0989

NameCVE-2011-0989
DescriptionThe RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file, as demonstrated by modifying a C# struct.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mono (PTS)jessie, jessie (lts)3.2.8+dfsg-10+deb8u1fixed
stretch (lts), stretch4.6.2.7+dfsg-1+deb9u1fixed
buster5.18.0.240+dfsg-3fixed
buster (security)5.18.0.240+dfsg-3+deb10u1fixed
bullseye6.8.0.105+dfsg-3.3~deb11u1fixed
bookworm6.8.0.105+dfsg-3.3fixed
sid, trixie6.8.0.105+dfsg-3.6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
monosource(unstable)(not affected)

Notes

- mono <not-affected> (Moonlight no longer present in Debian)

Search for package or bug name: Reporting problems