Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906) |
Informations | |||
---|---|---|---|
Name | MS10-060 | First vendor Publication | 2010-08-10 |
Vendor | Microsoft | Last vendor Modification | 2010-09-29 |
Severity (Vendor) | Critical | Revision | 1.2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.2 (September 29, 2010): Added a "Compatibility Flags" value to the workaround, "Temporarily prevent the Microsoft Silverlight ActiveX control from running in Internet Explorer (Method 1)."Summary: This security update resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS10-060.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12033 | |||
Oval ID: | oval:org.mitre.oval:def:12033 | ||
Title: | Microsoft Silverlight and Microsoft .NET Framework CLR Virtual Method Delegate Vulnerability | ||
Description: | The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP1, 2.0 SP2, 3.5, 3.5 SP1, and 3.5.1, and Microsoft Silverlight 2 and 3 before 3.0.50611.0 on Windows and before 3.0.41130.0 on Mac OS X, does not properly handle interfaces and delegations to virtual methods, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Virtual Method Delegate Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-1898 | Version: | 13 |
Platform(s): | Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 | Product(s): | Microsoft .NET Framework |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2010-08-11 | Name : Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2... File : nvt/secpod_ms10-060.nasl |
2005-11-03 | Name : foxweb CGI File : nvt/foxweb_dll.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66993 | Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote C... Microsoft .NET Framework and Silverlight contain a flaw related to the Common Language Runtime failing to properly handle virtual method delegations and interfaces. This may allow a context-dependent attacker to use a crafted ASP.NET application, XAML browser application or .NET Framework application to execute arbitrary code. |
66992 | Microsoft Silverlight Pointer Handling Unspecified Memory Corruption A memory corruption flaw exists in Microsoft Silverlight. The program fails to sanitize user-supplied input when handling pointers, resulting in memory corruption. With a specially crafted web site, a context-dependent attacker can execute arbitrary code. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft .NET CreateDelegate method arbitrary code execution attempt RuleID : 17118 - Revision : 7 - Type : FILE-EXECUTABLE |
2014-01-10 | Microsoft SilverLight ImageSource remote code execution attempt RuleID : 17114 - Revision : 15 - Type : OS-WINDOWS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2010-08-11 | Name : The Microsoft .NET Common Language Runtime and/or Microsoft Silverlight have ... File : smb_nt_ms10-060.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2016-04-26 23:01:00 |
|
2014-02-17 11:46:39 |
|
2014-01-19 21:30:30 |
|