Unrated severityNVD Advisory· Published Apr 13, 2011· Updated Apr 29, 2026
CVE-2011-0989
CVE-2011-0989
Description
The RuntimeHelpers.InitializeArray method in metadata/icall.c in Mono, when Moonlight 2.x before 2.4.1 or 3.x before 3.99.3 is used, does not properly restrict data types, which allows remote attackers to modify internal read-only data structures, and cause a denial of service (plugin crash) or corrupt the internal state of the security manager, via a crafted media file, as demonstrated by modifying a C# struct.
Affected products
7cpe:2.3:a:novell:moonlight:2.0:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:novell:moonlight:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:novell:moonlight:2.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:novell:moonlight:2.31:*:*:*:*:*:*:*
- cpe:2.3:a:novell:moonlight:2.4:*:*:*:*:*:*:*
- cpe:2.3:a:novell:moonlight:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:novell:moonlight:3.99:*:*:*:*:*:*:*
Patches
1035c8587c0d8Allow only primitive types/enums in RuntimeHelpers.InitializeArray ().
1 file changed · +2 −5
mono/metadata/icall.c+2 −5 modified@@ -854,12 +854,9 @@ ves_icall_System_Runtime_CompilerServices_RuntimeHelpers_InitializeArray (MonoAr int align; const char *field_data; - if (MONO_TYPE_IS_REFERENCE (type) || - (type->type == MONO_TYPE_VALUETYPE && - (!mono_type_get_class (type) || - mono_type_get_class (type)->has_references))) { + if (MONO_TYPE_IS_REFERENCE (type) || type->type == MONO_TYPE_VALUETYPE) { MonoException *exc = mono_get_exception_argument("array", - "Cannot initialize array containing references"); + "Cannot initialize array of non-primitive type."); mono_raise_exception (exc); }
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
10- openwall.com/lists/oss-security/2011/04/06/14nvdPatch
- bugzilla.novell.com/show_bug.cginvdPatch
- github.com/mono/mono/commit/035c8587c0d8d307e45f1b7171a0d337bb451f1envdPatch
- secunia.com/advisories/44002nvdVendor Advisory
- secunia.com/advisories/44076nvdVendor Advisory
- www.vupen.com/english/advisories/2011/0904nvdVendor Advisory
- lists.opensuse.org/opensuse-updates/2011-04/msg00024.htmlnvd
- www.mono-project.com/Vulnerabilitiesnvd
- www.securityfocus.com/bid/47208nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/66624nvd
News mentions
0No linked articles in our index yet.