Executive Summary

Summary
Title Vulnerability in .NET Framework Could Allow Remote Code Execution (2160841)
Informations
Name MS10-077 First vendor Publication 2010-10-12
Vendor Microsoft Last vendor Modification 2011-10-26
Severity (Vendor) Critical Revision 3.1

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Severity Rating: Critical

Revision Note: V3.1 (October 26, 2011): Corrected Server Core installation applicability for .NET Framework 4 on Windows Server 2008 R2 for x64-based Systems.

Summary: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms10-077

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:6824
 
Oval ID: oval:org.mitre.oval:def:6824
Title: .NET Framework x64 JIT Compiler Vulnerability
Description: The JIT compiler in Microsoft .NET Framework 4.0 on 64-bit platforms does not properly perform optimizations, which allows remote attackers to execute arbitrary code via a crafted .NET application that triggers memory corruption, aka ".NET Framework x64 JIT Compiler Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-3228
Version: 10
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Microsoft Windows Vista
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Product(s): Microsoft .NET Framework
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
68556 Microsoft .NET Framework x64 JIT Compiler Unprivileged Application Remote Cod...

Microsoft .NET Framework contains a flaw that may allow a remote attacker to execute arbitrary commands or code. The issue is due to an unspecified error in the JIT compiler while optimizing code, which can be exploited to corrupt memory when a user visits a web page hosting a specially crafted XBAP (XAML browser application).

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft .NET framework EntityObject execution attempt
RuleID : 18064 - Revision : 8 - Type : BROWSER-PLUGINS

Nessus® Vulnerability Scanner

Date Description
2010-10-13 Name : The version of the .NET Framework installed on the remote host allows arbitra...
File : smb_nt_ms10-077.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2014-02-17 11:46:43
  • Multiple Updates
2014-01-19 21:30:32
  • Multiple Updates
2013-05-11 00:49:43
  • Multiple Updates