Executive Summary

Summary
Title Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906)
Informations
Name MS10-060 First vendor Publication 2010-08-10
Vendor Microsoft Last vendor Modification 2010-09-29
Severity (Vendor) Critical Revision 1.2

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Revision Note: V1.2 (September 29, 2010): Added a "Compatibility Flags" value to the workaround, "Temporarily prevent the Microsoft Silverlight ActiveX control from running in Internet Explorer (Method 1)."Summary: This security update resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing the page, as could be the case in a Web hosting scenario.

Original Source

Url : http://www.microsoft.com/technet/security/bulletin/MS10-060.mspx

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-94 Failure to Control Generation of Code ('Code Injection')

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12033
 
Oval ID: oval:org.mitre.oval:def:12033
Title: Microsoft Silverlight and Microsoft .NET Framework CLR Virtual Method Delegate Vulnerability
Description: The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP1, 2.0 SP2, 3.5, 3.5 SP1, and 3.5.1, and Microsoft Silverlight 2 and 3 before 3.0.50611.0 on Windows and before 3.0.41130.0 on Mac OS X, does not properly handle interfaces and delegations to virtual methods, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Virtual Method Delegate Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-1898
Version: 13
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Product(s): Microsoft .NET Framework
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 5
Application 6

OpenVAS Exploits

Date Description
2010-08-11 Name : Microsoft .NET Common Language Runtime Remote Code Execution Vulnerability (2...
File : nvt/secpod_ms10-060.nasl
2005-11-03 Name : foxweb CGI
File : nvt/foxweb_dll.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
66993 Microsoft .NET Framework / Silverlight CLR Virtual Delegate Handling Remote C...

Microsoft .NET Framework and Silverlight contain a flaw related to the Common Language Runtime failing to properly handle virtual method delegations and interfaces. This may allow a context-dependent attacker to use a crafted ASP.NET application, XAML browser application or .NET Framework application to execute arbitrary code.
66992 Microsoft Silverlight Pointer Handling Unspecified Memory Corruption

A memory corruption flaw exists in Microsoft Silverlight. The program fails to sanitize user-supplied input when handling pointers, resulting in memory corruption. With a specially crafted web site, a context-dependent attacker can execute arbitrary code.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft .NET CreateDelegate method arbitrary code execution attempt
RuleID : 17118 - Revision : 7 - Type : FILE-EXECUTABLE
2014-01-10 Microsoft SilverLight ImageSource remote code execution attempt
RuleID : 17114 - Revision : 15 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2010-08-11 Name : The Microsoft .NET Common Language Runtime and/or Microsoft Silverlight have ...
File : smb_nt_ms10-060.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2016-04-26 23:01:00
  • Multiple Updates
2014-02-17 11:46:39
  • Multiple Updates
2014-01-19 21:30:30
  • Multiple Updates