Vulnerabilities > CVE-2007-5197 - Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Mono

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
suse
debian
opensuse
mono
CWE-119
nessus

Summary

Buffer overflow in the Mono.Math.BigInteger class in Mono 1.2.5.1 and earlier allows context-dependent attackers to execute arbitrary code via unspecified vectors related to Reduce in Montgomery-based Pow methods.

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_BYTEFX-DATA-MYSQL-4453.NASL
    descriptionThis update fixes a buffer overflow in Mono
    last seen2020-06-01
    modified2020-06-02
    plugin id29389
    published2007-12-13
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/29389
    titleSuSE 10 Security Update : Mono (ZYPP Patch Number 4453)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRAKE_MDKSA-2007-218.NASL
    descriptionIOActive Inc. found a buffer overflow in Mono.Math.BigInteger class in Mono 1.2.5.1 and previous versions, which allows arbitrary code execution by context-dependent attackers. Updated packages fix this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id28223
    published2007-11-15
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/28223
    titleMandrake Linux Security Advisory : mono (MDKSA-2007:218)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-553-1.NASL
    descriptionIt was discovered that Mono did not correctly bounds check certain BigInteger actions. Remote attackers could exploit this to crash a Mono application or possibly execute arbitrary code with user privileges. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id29238
    published2007-12-07
    reporterUbuntu Security Notice (C) 2007-2019 Canonical, Inc. / NASL script (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/29238
    titleUbuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : mono vulnerability (USN-553-1)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-1397.NASL
    descriptionAn integer overflow in the BigInteger data type implementation has been discovered in the free .NET runtime Mono. The oldstable distribution (sarge) doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id27621
    published2007-11-05
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/27621
    titleDebian DSA-1397-1 : mono - integer overflow
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200711-10.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200711-10 (Mono: Buffer overflow) IOActive discovered an error in the Mono.Math.BigInteger class, in the reduction step of the Montgomery-based Pow methods, that could lead to a buffer overflow. Impact : A remote attacker could exploit this vulnerability by sending specially crafted data to Mono applications using the BigInteger class, which might lead to the execution of arbitrary code with the privileges of the user running the application (possibly root) or a Denial of Service. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id27827
    published2007-11-08
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27827
    titleGLSA-200711-10 : Mono: Buffer overflow
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-3130.NASL
    descriptionA buffer overflow in the Mono.Math.BigInteger class in Mono allows attackers to execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id28163
    published2007-11-12
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/28163
    titleFedora 7 : mono-1.2.3-5.fc7 (2007-3130)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2009-322.NASL
    descriptionMultiple vulnerabilities has been found and corrected in mono : IOActive Inc. found a buffer overflow in Mono.Math.BigInteger class in Mono 1.2.5.1 and previous versions, which allows arbitrary code execution by context-dependent attackers (CVE-2007-5197). Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net class libraries in Mono 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via crafted attributes related to (1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs (RenderAttributes), (3) HtmlInputButton (RenderAttributes), (4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect (RenderChildren) (CVE-2008-3422). CRLF injection vulnerability in Sys.Web in Mono 2.0 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the query string (CVE-2008-3906). The XML HMAC signature system did not correctly check certain lengths. If an attacker sent a truncated HMAC, it could bypass authentication, leading to potential privilege escalation (CVE-2009-0217). Packages for 2008.0 are provided for Corporate Desktop 2008.0 customers The updated packages have been patched to fix these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id43041
    published2009-12-08
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/43041
    titleMandriva Linux Security Advisory : mono (MDVSA-2009:322)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2007-2969.NASL
    descriptionA buffer overflow in the Mono.Math.BigInteger class in Mono allows attackers to execute arbitrary code. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id27821
    published2007-11-08
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/27821
    titleFedora 8 : mono-1.2.5.1-2.fc8 (2007-2969)

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 26279 CVE(CAN) ID: CVE-2007-5197 Mono是基于.NET框架的开源开发平台,允许开发人员构建Linux和跨平台的应用。 Mono的Mono.Math.BigInteger类在实现BigInteger数据类型时存在整数溢出漏洞,允许本地攻击者执行任意指令。 Mono Mono 2.0 Mono Mono 1.x 厂商补丁: Debian ------ Debian已经为此发布了一个安全公告(DSA-1397-1)以及相应补丁: DSA-1397-1:New mono packages fix integer overflow 链接:<a href="http://www.debian.org/security/2007/dsa-1397" target="_blank">http://www.debian.org/security/2007/dsa-1397</a> 补丁下载: Source archives: <a href="http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1.dsc" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1.dsc</a> Size/MD5 checksum: 2536 690ff9b73b11712dafff48f4e573d844 <a href="http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1.diff.gz" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1.diff.gz</a> Size/MD5 checksum: 42815 a36c23b70d5f8c5042bae441c648f52b <a href="http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1.orig.tar.gz" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1.orig.tar.gz</a> Size/MD5 checksum: 19979026 b67ef657b83ca26249d7b9e9c5e7da69 Architecture independent components: <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-accessibility1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-accessibility1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 20926 d02d121b86ea13531199e1786e73d1c3 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-accessibility2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-accessibility2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 20856 e0e9b75f711cb831d6348ccc9b2e7c07 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-bytefx0.7.6.1-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-bytefx0.7.6.1-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 88810 f9d42b9343e99e77ad20709bb8372b51 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-bytefx0.7.6.2-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-bytefx0.7.6.2-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 88862 685c943b69999d6a7adf5038985c08b5 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-c5-1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-c5-1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 223620 878f83d238af926295a8fa6afe8df3e0 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-cairo1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-cairo1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 46194 9ec684d4784404eaa6d35ff0d3444311 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-cairo2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-cairo2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 46008 e7aa7d9c6fd374cfd0b1633525928c7a <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-corlib1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-corlib1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 1796690 e2d33d239a6d10e7ff936a0d8d99c428 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-corlib2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-corlib2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 2042898 03abdd8d7dc89bb7042b50a963736b34 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-cscompmgd7.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-cscompmgd7.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 24964 c2efe20fe8ca262dbb9528f8d074f01c <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-cscompmgd8.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-cscompmgd8.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 25184 0269e6ecb0c42331bf0b84027c365016 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-data-tds1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-data-tds1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 63412 adddd438a4bdd6c8d67724d78c7575ba <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-data-tds2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-data-tds2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 66572 8d0383577fab9fda56fb3a591cf3f4bb <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-firebirdsql1.7-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-firebirdsql1.7-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 288208 a618ebd6f6be362e742e13c40b9ac645 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-ldap1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-ldap1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 209962 7ff6bc9fe2f8edbb71860156f005a85e <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-ldap2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-ldap2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 209924 520f9d0b7f504e996a768173bbbe702f <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-microsoft-build2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-microsoft-build2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 207936 f7033604ac795332aee7dca7eaffab7b <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-microsoft7.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-microsoft7.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 256114 b086fad7713d77ec53334caa664fcfab <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-microsoft8.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-microsoft8.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 256164 7dcaf6bae502b45bb7d1c23474791d0b <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-npgsql1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-npgsql1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 128044 d12d1f98efb116b4f3b14fe149b18106 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-npgsql2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-npgsql2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 128046 722eb37bc3525c9094f5efaed0e27bf5 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-oracle1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-oracle1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 111426 f52ddfc4e9224df1bfa2a9ecfd6a654a <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-oracle2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-oracle2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 111038 737f5cad01c2de39b98c887f1377a8a1 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-peapi1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-peapi1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 99162 5d8084c4fb47df3811aad75b56030976 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-peapi2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-peapi2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 99252 9d3947b9476412b0d3b4801de3aa0174 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-relaxng1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-relaxng1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 171852 7bb5b1a89f808b4b1e944f1fe7e9b325 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-relaxng2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-relaxng2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 172276 76927b2c2acb8bbf1401b2f08873dac8 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-security1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-security1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 232218 cc64c5987ebfe92ec336263d21fb0f47 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-security2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-security2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 233346 124a4af44bec04cbb95e221eeeb44a4a <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-sharpzip0.6-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-sharpzip0.6-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 105428 0c45cd7bde57d392ad277e0b2b8021dc <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-sharpzip0.84-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-sharpzip0.84-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 126244 4ed4164c8826b6bdded35eb84fc382d7 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-sharpzip2.6-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-sharpzip2.6-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 105506 2fe08a03e7c51a3e9d4d6aa8762cb37b <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-sharpzip2.84-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-sharpzip2.84-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 126304 743cafdb99c5b3a3e35b5f9e2e2f08ff <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-sqlite1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-sqlite1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 43516 3327d1d49bc97d19db2d0a8b61a26917 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-sqlite2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-sqlite2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 43506 f57fa7a5fe65a406d6d2b45c59e16bd3 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-data1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-data1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 435142 87789fcd551d9d50c03685101f131946 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-data2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-data2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 519990 115c23eb418c955f2ed707a6d74b36f6 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-ldap1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-ldap1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 48114 8309c8db106d7d899753b5423edc4300 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-ldap2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-ldap2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 48074 80b8760b5f12c9d629f41f2746c7f244 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-messaging1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-messaging1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 64276 dc332b77384c875f2d796d84bef786fb <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-messaging2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-messaging2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 64264 6c5ccefd9ada8cb31fe05de0f1529f07 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-runtime1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-runtime1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 112958 9c9f35dd37ba3fdadc37a2dead326fa5 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-runtime2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-runtime2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 130466 5f73bd56ea1b7d3fad8f07592a4af67e <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-web1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-web1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 738654 23e25d755446735f77797ae4dbcf02a4 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system-web2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system-web2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 1447448 cc0e9de505364ce60d46a295ad1fad4f <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 1686030 8ddfa23403689c1f97886a9e1a865db3 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-system2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-system2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 2224592 0f9b0518dc09a98a5ac01d28b84fd43c <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-winforms1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-winforms1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 1393032 3f65fa6c71f92ad4588a7318276c378e <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-winforms2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-winforms2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 1689678 216ae80afc19d2eb5e94cd33cb6efdfe <a href="http://security.debian.org/pool/updates/main/m/mono/libmono1.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono1.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 394524 bc958956b138b0172a77cd9adcce733a <a href="http://security.debian.org/pool/updates/main/m/mono/libmono2.0-cil_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono2.0-cil_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 394534 f3360dc37e12b0814ca32ca48852fc66 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-gac_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-gac_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 30680 15bbcbf06bb771d85067bbb5fe4973cd <a href="http://security.debian.org/pool/updates/main/m/mono/mono-gmcs_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-gmcs_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 815244 386ad3abda1bc137e9e26327ef8f729a <a href="http://security.debian.org/pool/updates/main/m/mono/mono-mcs_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-mcs_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 988382 ea67fcc1e19fa99975c5c880543a1990 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-mjs_1.2.2.1-1etch1_all.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-mjs_1.2.2.1-1etch1_all.deb</a> Size/MD5 checksum: 26752 805b856b0c85816b99e1ade3c3509f02 AMD64 architecture: <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-dev_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-dev_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 1142876 5f299302075de6463557074fe9c70dc9 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono0_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono0_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 850862 c54a56330b1f23cf654afaeaeb273943 <a href="http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 1224 e76e27f0bf91ee4560a2472557075355 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-common_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-common_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 97088 13b15c279671ca4220a1fb1df589b026 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-devel_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-devel_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 17084 01a4c5bdb22091672ca682c06f91bb1a <a href="http://security.debian.org/pool/updates/main/m/mono/mono-jay_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-jay_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 61050 4fc383315e15cb7348aec6b3482ce5a6 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-jit_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-jit_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 745536 eedf98656a6e2f2624ea54507fffa111 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-runtime_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-runtime_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 17054 b4011469915df10de91196be9bb0f0c6 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-utils_1.2.2.1-1etch1_amd64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-utils_1.2.2.1-1etch1_amd64.deb</a> Size/MD5 checksum: 1120806 76e7635cea950b89efe22cebe3ddd183 ARM architecture: <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-dev_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-dev_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 1055134 feb1dae790628d833aeb1ad5d5b49a47 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono0_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono0_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 782388 0363966b23932b51b4808dc298588b45 <a href="http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 1224 b131a782076ff0241813f355b4224a63 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-common_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-common_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 95752 c0edfa13fae9e22608665fc33c264a15 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-devel_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-devel_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 17088 c20515b05d012e85d4bbc42f6840e28e <a href="http://security.debian.org/pool/updates/main/m/mono/mono-jay_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-jay_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 61398 b9d465c9e67af1082e572db1067d273c <a href="http://security.debian.org/pool/updates/main/m/mono/mono-jit_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-jit_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 679070 4ad5ee1e7f10585abb1cdfae1623c586 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-runtime_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-runtime_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 17052 63425b4783337dfbeff8d22000da0b20 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-utils_1.2.2.1-1etch1_arm.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-utils_1.2.2.1-1etch1_arm.deb</a> Size/MD5 checksum: 1055504 54613267f35d45757077a81770ee7bf0 Intel IA-32 architecture: <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-dev_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-dev_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 1056588 ab6bec82baebd30a61d9d86bd142ba99 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono0_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono0_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 775306 f4ab41beb2e68058ab6c8d6abb1884da <a href="http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 1222 f7c3d2e9d42d3f2fa4caa99050219f4f <a href="http://security.debian.org/pool/updates/main/m/mono/mono-common_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-common_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 96800 609cf64aeccde22225d667c51cd2adc0 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-devel_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-devel_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 17080 ebc41e48782f7fdee64e73347e8bb0a6 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-jay_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-jay_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 54994 4e751e2a709951b6a4e5030c9e4437e9 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-jit_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-jit_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 670186 7e55db852cb362f68336b6a1ead157ad <a href="http://security.debian.org/pool/updates/main/m/mono/mono-runtime_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-runtime_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 17044 1996e25314bc972f7c7ceef44c3a1a30 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-utils_1.2.2.1-1etch1_i386.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-utils_1.2.2.1-1etch1_i386.deb</a> Size/MD5 checksum: 1035690 2728352f87d6d6b68a637a259da9b2ae Intel IA-64 architecture: <a href="http://security.debian.org/pool/updates/main/m/mono/libmono-dev_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono-dev_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 1572222 942b9dae42083392f09e962b1dcff8d8 <a href="http://security.debian.org/pool/updates/main/m/mono/libmono0_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/libmono0_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 1153008 c1c446735dcddacdc406898080f27fd2 <a href="http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 1220 9d62681eca4e2327eeb109905009ebf6 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-common_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-common_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 99040 750b89739f7a5f1dc2051686514561df <a href="http://security.debian.org/pool/updates/main/m/mono/mono-devel_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-devel_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 17082 78680ea864fc7fd56701748da60f761e <a href="http://security.debian.org/pool/updates/main/m/mono/mono-jay_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-jay_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 81032 2ec0d0295ec74cdc69ab2638afc7bb9f <a href="http://security.debian.org/pool/updates/main/m/mono/mono-jit_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-jit_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 1052472 f1e13c743493c8abb0738313f96b9851 <a href="http://security.debian.org/pool/updates/main/m/mono/mono-runtime_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-runtime_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 17050 ecb577d4e3506910c7b3b857d3b0d04a <a href="http://security.debian.org/pool/updates/main/m/mono/mono-utils_1.2.2.1-1etch1_ia64.deb" target="_blank">http://security.debian.org/pool/updates/main/m/mono/mono-utils_1.2.2.1-1etch1_ia64.deb</a> Size/MD5 checksum: 1515488 8201bc0b63900af5706b36239380c3f4 补丁安装方法: 1. 手工安装补丁包: 首先,使用下面的命令来下载补丁软件: # wget url (url是补丁下载链接地址) 然后,使用下面的命令来安装补丁: # dpkg -i file.deb (file是相应的补丁名) 2. 使用apt-get自动安装补丁包: 首先,使用下面的命令更新内部数据库: # apt-get update 然后,使用下面的命令安装更新软件包: # apt-get upgrade
idSSV:2399
last seen2017-11-19
modified2007-11-08
published2007-11-08
reporterRoot
titleMono System.Math BigInteger整数溢出漏洞