CVE-2010-4254
Summary
| CVE | CVE-2010-4254 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-12-06 13:44:54 UTC |
| Updated | 2026-04-29 01:13:23 UTC |
| Description | Mono, when Moonlight before 2.3.0.1 or 2.99.x before 2.99.0.10 is used, does not properly validate arguments to generic methods, which allows remote attackers to bypass generic constraints, and possibly execute arbitrary code, via a crafted method call. |
Risk And Classification
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:L/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Mono | Mono | All | All | All | All |
| Application | Novell | Moonlight | 2.99.0 | All | All | All |
| Application | Novell | Moonlight | 2.99.1 | All | All | All |
| Application | Novell | Moonlight | 2.99.2 | All | All | All |
| Application | Novell | Moonlight | 2.99.7 | All | All | All |
| Application | Novell | Moonlight | 2.99.9 | All | All | All |
| Application | Novell | Moonlight | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Access Denied | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.novell.com | |
| Vulnerabilities - Mono | af854a3a-2127-422b-91ae-364da2661108 | www.mono-project.com | |
| SUSE update for multiple packages - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| Bug 654136 – Insufficient validation of generic type arguments during reflection allows violation of the type system | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.novell.com | |
| Mono/Moonlight Generic Type Argument Local Privilege Escalation | af854a3a-2127-422b-91ae-364da2661108 | www.exploit-db.com | |
| Handle invalid instantiation of generic methods. · mono/mono@cf1ec14 · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | Patch |
| Mono/Moonlight Generic Type Argument Local Privilege Escalation Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Handle invalid instantiation of generic methods. · mono/mono@65292a6 · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | Patch |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2010:024 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Handle invalid instantiation of generic methods. · mono/mono@4905ef1 · GitHub | af854a3a-2127-422b-91ae-364da2661108 | github.com | Patch |
| Moonlight Generic Constraints Bypass Vulnerability - Advisories - Community | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | Vendor Advisory |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2011:001 | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.