Executive Summary
Summary | |
---|---|
Title | Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution (974378) |
Informations | |||
---|---|---|---|
Name | MS09-061 | First vendor Publication | 2009-10-13 |
Vendor | Microsoft | Last vendor Modification | 2010-06-22 |
Severity (Vendor) | Critical | Revision | 1.4 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Revision Note: V1.4 (June 22, 2010): Removed .NET Framework 1.1 Service Pack 1 as an affected component on Windows 7 and Windows Server 2008 R2.Summary: This security update resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. |
Original Source
Url : http://www.microsoft.com/technet/security/bulletin/MS09-061.mspx |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
67 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
33 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:6451 | |||
Oval ID: | oval:org.mitre.oval:def:6451 | ||
Title: | Microsoft .NET Framework Type Verification Vulnerability | ||
Description: | Microsoft .NET Framework 2.0, 2.0 SP1, and 3.5 does not properly enforce a certain type-equality constraint in .NET verifiable code, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Type Verification Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2009-0091 | Version: | 6 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Vista Microsoft Windows 7 Microsoft Windows Server 2003 Microsoft Windows Server 2008 | Product(s): | Microsoft .NET Framework |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-10-15 | Name : Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378) File : nvt/secpod_ms09-061.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
58851 | Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulatio... |
58850 | Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution |
58849 | Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Windows .NET MSIL CombineImpl suspicious usage attempt RuleID : 16183 - Revision : 15 - Type : FILE-EXECUTABLE |
2014-01-10 | Microsoft .NET MSIL stack corruption attempt RuleID : 16182 - Revision : 9 - Type : FILE-EXECUTABLE |
2014-01-10 | Microsoft .NET MSIL CLR interface multiple instantiation attempt RuleID : 16179 - Revision : 9 - Type : FILE-EXECUTABLE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-10-14 | Name : The Microsoft .NET Common Language Runtime is affected by multiple vulnerabil... File : smb_nt_ms09-061.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:46:23 |
|
2014-01-19 21:30:23 |
|