CVE-2010-4159
Summary
| CVE | CVE-2010-4159 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-11-17 16:00:36 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory. |
Risk And Classification
Primary CVSS: v2.0 6.9 from [email protected]
AV:L/AC:M/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mono | Mono | 1.0 | All | All | All |
| Application | Mono | Mono | 1.0.1 | All | All | All |
| Application | Mono | Mono | 1.0.2 | All | All | All |
| Application | Mono | Mono | 1.0.4 | All | All | All |
| Application | Mono | Mono | 1.0.5 | All | All | All |
| Application | Mono | Mono | 1.0.6 | All | All | All |
| Application | Mono | Mono | 1.1.1 | All | All | All |
| Application | Mono | Mono | 1.1.10 | All | All | All |
| Application | Mono | Mono | 1.1.10.1 | All | All | All |
| Application | Mono | Mono | 1.1.11 | All | All | All |
| Application | Mono | Mono | 1.1.12 | All | All | All |
| Application | Mono | Mono | 1.1.12.1 | All | All | All |
| Application | Mono | Mono | 1.1.13 | All | All | All |
| Application | Mono | Mono | 1.1.13.2 | All | All | All |
| Application | Mono | Mono | 1.1.13.4 | All | All | All |
| Application | Mono | Mono | 1.1.13.5 | All | All | All |
| Application | Mono | Mono | 1.1.13.6 | All | All | All |
| Application | Mono | Mono | 1.1.13.7 | All | All | All |
| Application | Mono | Mono | 1.1.13.8 | All | All | All |
| Application | Mono | Mono | 1.1.13.8.1 | All | All | All |
| Application | Mono | Mono | 1.1.14 | All | All | All |
| Application | Mono | Mono | 1.1.15 | All | All | All |
| Application | Mono | Mono | 1.1.16 | All | All | All |
| Application | Mono | Mono | 1.1.16.1 | All | All | All |
| Application | Mono | Mono | 1.1.17 | All | All | All |
| Application | Mono | Mono | 1.1.17.1 | All | All | All |
| Application | Mono | Mono | 1.1.17.2 | All | All | All |
| Application | Mono | Mono | 1.1.18 | All | All | All |
| Application | Mono | Mono | 1.1.2 | All | All | All |
| Application | Mono | Mono | 1.1.3 | All | All | All |
| Application | Mono | Mono | 1.1.4 | All | All | All |
| Application | Mono | Mono | 1.1.5 | All | All | All |
| Application | Mono | Mono | 1.1.6 | All | All | All |
| Application | Mono | Mono | 1.1.7 | All | All | All |
| Application | Mono | Mono | 1.1.8 | All | All | All |
| Application | Mono | Mono | 1.1.8.1 | All | All | All |
| Application | Mono | Mono | 1.1.8.3 | All | All | All |
| Application | Mono | Mono | 1.1.9 | All | All | All |
| Application | Mono | Mono | 1.1.9.1 | All | All | All |
| Application | Mono | Mono | 1.1.9.2 | All | All | All |
| Application | Mono | Mono | 1.2 | All | All | All |
| Application | Mono | Mono | 1.2.1 | All | All | All |
| Application | Mono | Mono | 1.2.2 | All | All | All |
| Application | Mono | Mono | 1.2.2.1 | All | All | All |
| Application | Mono | Mono | 1.2.3 | All | All | All |
| Application | Mono | Mono | 1.2.3.1 | All | All | All |
| Application | Mono | Mono | 1.2.4 | All | All | All |
| Application | Mono | Mono | 1.2.5 | All | All | All |
| Application | Mono | Mono | 1.2.5.1 | All | All | All |
| Application | Mono | Mono | 1.2.5.2 | All | All | All |
| Application | Mono | Mono | 1.2.6 | All | All | All |
| Application | Mono | Mono | 1.9 | All | All | All |
| Application | Mono | Mono | 1.9.1 | All | All | All |
| Application | Mono | Mono | 2.0 | All | All | All |
| Application | Mono | Mono | 2.0.1 | All | All | All |
| Application | Mono | Mono | 2.2 | All | All | All |
| Application | Mono | Mono | 2.4 | All | All | All |
| Application | Mono | Mono | 2.4.2 | All | All | All |
| Application | Mono | Mono | 2.4.2.1 | All | All | All |
| Application | Mono | Mono | 2.4.2.2 | All | All | All |
| Application | Mono | Mono | 2.4.2.3 | All | All | All |
| Application | Mono | Mono | 2.4.3 | All | All | All |
| Application | Mono | Mono | 2.6 | All | All | All |
| Application | Mono | Mono | 2.6.3 | All | All | All |
| Application | Mono | Mono | 2.6.4 | All | All | All |
| Application | Mono | Mono | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| '[oss-security] CVE request: mono loading shared libs from cwd' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| 'Re: [oss-security] CVE request: mono loading shared libs from cwd' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Vulnerabilities - Mono | af854a3a-2127-422b-91ae-364da2661108 | www.mono-project.com | |
| Security Advisory SA42174 - Mono Unsafe Library Loading Vulnerability - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| Support / Security / Advisories / / MDVSA-2010:240 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Mono 'loader.c' Library Loading Local Privilege Escalation Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Bug 641915 – Security hole: Mono should not search current directory for DLLs | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.novell.com | |
| Search for dllimported shared libs in the base directory, not cwd. · mono/mono@8e890a3 · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | Patch |
| 'Re: [oss-security] CVE request: mono loading shared libs from cwd' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| lists.ximian.com/pipermail/mono-patches/2010-October/177900.html | af854a3a-2127-422b-91ae-364da2661108 | lists.ximian.com | Patch |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.