CERT-In Vulnerability Note
CIVN-2010-0228
Microsoft .NET Framework Could Allow Remote Code Execution vulnerability
Original Issue Date:October 15, 2010
Severity Rating: HIGH
Systems Affected
- Microsoft Windows XP Professional x64 Edition Service Pack 2
- Microsoft Windows Server 2003 x64 Edition Service Pack 2
- Microsoft Windows Server 2003 SP2 (Itanium)
- Microsoft Windows Vista x64 Edition Service Pack 1
- Microsoft Windows Vista x64 Edition Service Pack 2
- Microsoft Windows Server 2008 (64x)
- Microsoft Windows Server 2008 (64x) Service Pack 2
- Microsoft Windows Server 2008 (Itanium)
- Microsoft Windows Server 2008 (Itanium) Service Pack 2
- Microsoft Windows 7 (64x)
- Microsoft Windows Server 2008 R2 (64x)
Component Affected
- Microsoft .NET Framework 4.0
Overview
A remote code execution vulnerability has been reported in Microsoft .Net Framework which could allow an remote attacker to execute an arbitrary code on the effective system and take complete control of the system in the context of logged in user.
Description
The .NET Framework JIT compiler is a .NET Framework runtime component which compiles Microsoft Intermediate Language (MSIL) against the Common Language Runtime (CLR) on demand at application run time.
An XAML browser application (XBAP) combines features of both a Web application and a rich-client application. Like Web applications, XBAPs can be published to a Web server and launched from Internet Explorer
This vulnerability exists in the Microsoft .Net Framework JIT compiler while optimizing code. An attacker could exploit this vulnerability by sending a specially crafted webpage containing XBAP (XAML browser application) and persuade user to open this specially crafted page. Opening the page results memory corruption in unsafe manner. Successful exploitation of this vulnerability could allow an attacker to execute an arbitrary remote code and take complete control of the affected system in the context of logged in user. NOTE : This can also be exploited to break out of the ASP.NET sandbox with a specially crafted ASP.NET application
Workaround
- Disable partially trusted Microsoft .NET applications
- Disable XAML browser applications in Internet Explorer
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS10-077
Microsoft Knowledge Base Article
2160841
Vendor Information
Microsoft
http://www.microsoft.com/technet/security/bulletin/MS10-077.mspx
References
Microsoft
http://www.microsoft.com/technet/security/bulletin/MS10-077.mspx
Vupen
http://www.vupen.com/english/advisories/2010/2624
SecurityTracker
http://securitytracker.com/alerts/2010/Oct/1024543.html
Secunia
http://secunia.com/advisories/41751/
CVE Name
CVE-2010-3228
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|