This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsaid="201405-16">
<title>Mono: Denial of Service</title>
<synopsis>A hash collision vulnerability in Mono allows remote attackers to
cause a Denial of Service condition.
</synopsis>
<producttype="ebuild">mono</product>
<announced>2014-05-18</announced>
<revisedcount="1">2014-05-18</revised>
<bug>433768</bug>
<access>remote</access>
<affected>
<packagename="dev-lang/mono"auto="yes"arch="*">
<unaffectedrange="ge">2.10.9-r2</unaffected>
<vulnerablerange="lt">2.10.9-r2</vulnerable>
</package>
</affected>
<background>
<p>Mono is an open source implementation of Microsoft’s .NET Framework.</p>
</background>
<description>
<p>Mono does not properly randomize hash functions for form posts to
protect against hash collision attacks.
</p>
</description>
<impacttype="normal">
<p>A remote attacker could send specially crafted parameters, possibly
resulting in a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Mono users should upgrade to the latest version:</p>