Executive Summary

Title Vulnerability in .NET Framework Could Allow Remote Code Execution (2484015)
Name MS11-028 First vendor Publication 2011-04-12
Vendor Microsoft Last vendor Modification 2011-11-30
Severity (Vendor) Critical Revision 2.4

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Severity Rating: Critical

Revision Note: V2.4 (November 30, 2011): Corrected the bulletin replacement information for .NET Framework 4 on Windows 7 for x64-based Systems Service Pack 1, Windows Server 2008 R2 for x64-based Systems Service Pack 1, and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1. This is a bulletin change only. There were no changes to the detection or security update files.

Summary: This security update resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions.

Original Source

Url : http://technet.microsoft.com/en-us/security/bulletin/ms11-028

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-20 Improper Input Validation

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:12406
Oval ID: oval:org.mitre.oval:def:12406
Title: .NET Framework Stack Corruption Vulnerability
Description: The x86 JIT compiler in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 does not properly compile function calls, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Stack Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2010-3958
Version: 9
Platform(s): Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Product(s): Microsoft .NET Framework
Definition Synopsis:

CPE : Common Platform Enumeration

Application 4

OpenVAS Exploits

Date Description
2011-04-13 Name : Microsoft .NET Framework Remote Code Execution Vulnerability (2484015)
File : nvt/secpod_ms11-028.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
71782 Microsoft .NET Framework x86 JIT Compiler XAML Browser Application (XBAP) Pro...

A memory corruption flaw exists in Microsoft .NET Framework. The x86 JIT compiler fails to sanitize user-supplied input when compiling function calls, resulting in memory corruption. With a specially crafted XAML browser, ASP.NET or .NET Framework application, a context-dependent attacker can execute arbitrary code.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Windows .NET Framework XAML browser applications stack corruption
RuleID : 19170 - Revision : 12 - Type : FILE-OTHER
2014-01-10 Microsoft Windows .NET framework optimizer escalation attempt
RuleID : 18624 - Revision : 8 - Type : OS-WINDOWS

Nessus® Vulnerability Scanner

Date Description
2011-04-13 Name : The version of the .NET Framework installed on the remote host allows arbitra...
File : smb_nt_ms11-028.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2014-02-17 11:46:56
  • Multiple Updates
2014-01-19 21:30:39
  • Multiple Updates