Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2014-4062 | First vendor Publication | 2014-08-12 |
Vendor | Cve | Last vendor Modification | 2018-10-12 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, and 3.5.1 does not properly implement the ASLR protection mechanism, which allows remote attackers to obtain sensitive address information via a crafted web site, aka ".NET ASLR Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4062 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:26465 | |||
Oval ID: | oval:org.mitre.oval:def:26465 | ||
Title: | .NET ASLR vulnerability - CVE-2014-4062 (MS14-046) | ||
Description: | Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, and 3.5.1 does not properly implement the ASLR protection mechanism, which allows remote attackers to obtain sensitive address information via a crafted web site, aka ".NET ASLR Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2014-4062 | Version: | 5 |
Platform(s): | Microsoft Windows 7 Microsoft Windows 8 Microsoft Windows Server 2012 Microsoft Windows 8.1 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista | Product(s): | Microsoft .NET Framework 2.0 Microsoft .NET Framework 3.0 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5.1 |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 5 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2014-08-14 | IAVM : 2014-A-0128 - Microsoft .NET Framework Security Feature Bypass Vulnerability Severity : Category II - VMSKEY : V0053805 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-11-16 | Microsoft Internet Explorer CGeneratedTreeNode use-after-free attempt RuleID : 31793 - Revision : 2 - Type : BROWSER-IE |
2014-11-16 | Microsoft Internet Explorer CGeneratedTreeNode use-after-free attempt RuleID : 31792 - Revision : 2 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-08-12 | Name : The version of the .NET Framework installed on the remote host is affected by... File : smb_nt_ms14-046.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|---|
BID | http://www.securityfocus.com/bid/69145 |
MS | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14... |
SECTRACK | http://www.securitytracker.com/id/1030721 |
Alert History
Date | Informations |
---|---|
2024-02-02 01:27:53 |
|
2024-02-01 12:08:16 |
|
2023-09-05 12:26:25 |
|
2023-09-05 01:08:10 |
|
2023-09-02 12:26:26 |
|
2023-09-02 01:08:17 |
|
2023-08-12 12:28:46 |
|
2023-08-12 01:07:47 |
|
2023-08-11 12:24:33 |
|
2023-08-11 01:07:59 |
|
2023-08-06 12:23:51 |
|
2023-08-06 01:07:46 |
|
2023-08-04 12:23:55 |
|
2023-08-04 01:07:50 |
|
2023-07-14 12:23:54 |
|
2023-07-14 01:07:49 |
|
2023-03-29 01:25:45 |
|
2023-03-28 12:08:09 |
|
2022-10-11 12:21:34 |
|
2022-10-11 01:07:57 |
|
2021-05-04 12:32:30 |
|
2021-04-22 01:39:46 |
|
2020-11-24 12:12:09 |
|
2020-05-23 00:41:20 |
|
2018-10-13 05:18:47 |
|
2017-01-07 09:25:37 |
|
2015-10-18 17:22:41 |
|
2014-08-14 09:21:56 |
|
2014-08-13 13:24:54 |
|
2014-08-13 05:22:38 |
|