Executive Summary

Summary
Title Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution (974378)
Informations
Name MS09-061 First vendor Publication 2009-10-13
Vendor Microsoft Last vendor Modification 2010-06-22
Severity (Vendor) Critical Revision 1.4

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.4 (June 22, 2010): Removed .NET Framework 1.1 Service Pack 1 as an affected component on Windows 7 and Windows Server 2008 R2.Summary: This security update resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/MS09-061.mspx

CWE : Common Weakness Enumeration

% Id Name
67 % CWE-94 Failure to Control Generation of Code ('Code Injection')
33 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:5716
 
Oval ID: oval:org.mitre.oval:def:5716
Title: Microsoft .NET Framework Pointer Verification Vulnerability
Description: Microsoft .NET Framework 1.0 SP3, 1.1 SP1, and 2.0 SP1 does not properly validate .NET verifiable code, which allows remote attackers to obtain unintended access to stack memory, and execute arbitrary code, via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Pointer Verification Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-0090
Version: 8
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Product(s): Microsoft .NET Framework
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6451
 
Oval ID: oval:org.mitre.oval:def:6451
Title: Microsoft .NET Framework Type Verification Vulnerability
Description: Microsoft .NET Framework 2.0, 2.0 SP1, and 3.5 does not properly enforce a certain type-equality constraint in .NET verifiable code, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft .NET Framework Type Verification Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-0091
Version: 6
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Product(s): Microsoft .NET Framework
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:6510
 
Oval ID: oval:org.mitre.oval:def:6510
Title: Microsoft Silverlight and Microsoft .NET Framework CLR Vulnerability
Description: The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0, 2.0 SP1, 2.0 SP2, 3.5, and 3.5 SP1, and Silverlight 2, does not properly handle interfaces, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted Silverlight application, (3) a crafted ASP.NET application, or (4) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2009-2497
Version: 8
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Product(s): Microsoft .NET Framework
Microsoft Silverlight
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 7
Os 1
Os 1
Os 1
Os 9
Os 4
Os 3

OpenVAS Exploits

Date Description
2009-10-15 Name : Microsoft .NET Common Language Runtime Code Execution Vulnerability (974378)
File : nvt/secpod_ms09-061.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
58851 Microsoft .NET Framework / Silverlight Crafted Application Memory Manipulatio...

58850 Microsoft .NET Framework Object Casting Manipulation Arbitrary Code Execution

58849 Microsoft .NET Framework Crafted Application Managed Pointer Access Arbitrary...

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows .NET MSIL CombineImpl suspicious usage attempt
RuleID : 16183 - Revision : 15 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft .NET MSIL stack corruption attempt
RuleID : 16182 - Revision : 9 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft .NET MSIL CLR interface multiple instantiation attempt
RuleID : 16179 - Revision : 9 - Type : FILE-EXECUTABLE

Nessus® Vulnerability Scanner

Date Description
2009-10-14 Name : The Microsoft .NET Common Language Runtime is affected by multiple vulnerabil...
File : smb_nt_ms09-061.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
Date Informations
2014-02-17 11:46:23
  • Multiple Updates
2014-01-19 21:30:23
  • Multiple Updates