Mandriva Linux Security Advisory : mono (MDVSA-2009:322)

high Nessus Plugin ID 43041
New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 5.8


The remote Mandriva Linux host is missing one or more security updates.


Multiple vulnerabilities has been found and corrected in mono :

IOActive Inc. found a buffer overflow in Mono.Math.BigInteger class in Mono and previous versions, which allows arbitrary code execution by context-dependent attackers (CVE-2007-5197).

Multiple cross-site scripting (XSS) vulnerabilities in the class libraries in Mono 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via crafted attributes related to (1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs (RenderAttributes), (3) HtmlInputButton (RenderAttributes), (4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect (RenderChildren) (CVE-2008-3422).

CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string (CVE-2008-3906).

The XML HMAC signature system did not correctly check certain lengths.
If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation (CVE-2009-0217).

Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers

The updated packages have been patched to fix these issues.


Update the affected packages.

Plugin Details

Severity: High

ID: 43041

File Name: mandriva_MDVSA-2009-322.nasl

Version: 1.20

Type: local

Published: 12/8/2009

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: High

VPR Score: 5.8

CVSS v2.0

Base Score: 7.5

Temporal Score: 5.9

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:jay, p-cpe:/a:mandriva:linux:lib64mono-devel, p-cpe:/a:mandriva:linux:lib64mono0, p-cpe:/a:mandriva:linux:libmono-devel, p-cpe:/a:mandriva:linux:libmono0, p-cpe:/a:mandriva:linux:mono, p-cpe:/a:mandriva:linux:mono-bytefx-data-mysql, p-cpe:/a:mandriva:linux:mono-data, p-cpe:/a:mandriva:linux:mono-data-firebird, p-cpe:/a:mandriva:linux:mono-data-oracle, p-cpe:/a:mandriva:linux:mono-data-postgresql, p-cpe:/a:mandriva:linux:mono-data-sqlite, p-cpe:/a:mandriva:linux:mono-data-sybase, p-cpe:/a:mandriva:linux:mono-doc, p-cpe:/a:mandriva:linux:mono-extras, p-cpe:/a:mandriva:linux:mono-ibm-data-db2, p-cpe:/a:mandriva:linux:mono-jscript, p-cpe:/a:mandriva:linux:mono-locale-extras, p-cpe:/a:mandriva:linux:mono-nunit, p-cpe:/a:mandriva:linux:mono-web, p-cpe:/a:mandriva:linux:mono-winforms, cpe:/o:mandriva:linux:2008.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/7/2009

Reference Information

CVE: CVE-2007-5197, CVE-2008-3422, CVE-2008-3906, CVE-2009-0217

BID: 26279, 35671

MDVSA: 2009:322

CWE: 20, 79, 119