Description
Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
Published: 2010-08-24
Score: 6.8 Medium
EPSS: 1.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2010-1553 Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
Ubuntu USN Ubuntu USN USN-993-1 libgdiplus vulnerability
History

No history.

Subscriptions

Mono-project Libgdiplus
cve-icon MITRE

Status: PUBLISHED

Assigner: flexera

Published:

Updated: 2024-08-07T01:28:41.501Z

Reserved: 2010-04-26T00:00:00.000Z

Link: CVE-2010-1526

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-08-24T22:00:01.487

Modified: 2026-04-29T01:13:23.040

Link: CVE-2010-1526

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses