CERT-In Vulnerability Note
CIVN-2012-0110
Remote Code Execution Vulnerabilities in Microsoft .NET Framework
Original Issue Date:November 14, 2012
Severity Rating: HIGH
Systems Affected
- Windows XP SP3
- Windows XP Professional x64 Edition SP 2
- Windows Server 2003 SP 2
- Windows Server 2003 x64 Edition SP 2
- Windows Server 2003 with SP2 for Itanium-based Systems
- Windows Vista SP 2
- Windows Vista x64 Edition SP 2
- Windows Server 2008 for 32-bit Systems SP 2
- Windows Server 2008 for x64-based Systems SP 2
- Windows Server 2008 for Itanium-based Systems SP 2
- Windows 7 for 32-bit Systems and SP1
- Windows 7 for x64-based Systems and SP1
- Windows Server 2008 R2 for x64-based Systems and SP1
- Windows Server 2008 R2 for Itanium-based Systems and SP1
- Windows 8 for 32-bit & 64-bit Systems
- Windows Server 2012
- Windows RT
- Windows Server 2008 R2 for x64-based Systems and SP1 (Server Core installation)
- Windows Server 2012 (Server Core installation)
Component Affected
- Microsoft .NET Framework 1.0 SP 3
- Microsoft .NET Framework 1.1 SP 1
- Microsoft .NET Framework 2.0 SP 2
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4
- Microsoft .NET Framework 4.5
Overview
Multiple vulnerabilities have been reported in .NET Framework, which could be exploited by remote attackers to execute arbitrary code to take control of the affected system in the context of currently logged-in user.
Description
1. Microsoft .NET Object Reflection Security Bypass Vulnerability
(
CVE-2012-1895
)
This vulnerability exists due to improper handling of user-supplied data processed by the .NET Framework. A remote attacker could exploit this vulnerability by convincing a user to visit a malicious website contains a specially crafted XBAP (XAML browser application), which could lead to an error condition, allow an attacker to bypass security restrictions and execute arbitrary code on the affected system or bypass CAS restrictions.Workaround - Disable XAML browser applications in Internet Explorer
2. Microsoft .NET Code Access Security Info Disclosure Vulnerability
(
CVE-2012-1896
)
This vulnerability exists due to insufficient sanitation of a certain function output when the function is called from partially trusted code. A remote attacker could exploit this vulnerability by convincing a user to visit a malicious website, which could lead to an error condition and allow the attacker to access sensitive information on the targeted system or bypass Code Access Security (CAS) restrictions.
3. Microsoft .NET Framework Insecure Library Loading Arbitrary Code Execution Vulnerability
(
CVE-2012-2519
)
The vulnerability exists due to improper handling of external dynamic-link library (DLL) files by the .NET Framework. A remote attacker could exploit this vulnerability by hosting a crafted DLL in a network directory that contains an application which is built with ADO.NET and convincing a user to open the .NET application. Successful exploitation of this vulnerability could allow the remote attacker to execute arbitrary code to take control of the affected system.Workaround - Disable loading of libraries from WebDAV and remote network shares
- Disable the WebClient service
- Block TCP ports 139 and 445 at the firewall
4. Microsoft .NET Framework Web Proxy Auto-Discovery(WPAD) Arbitrary Code Execution Vulnerability
(
CVE-2012-4776
)
This vulnerability exists due to lack of validation when the .NET Framework acquires the default web proxy settings and executes JavaScript contain within the proxy auto-configuration file. A remote attacker could exploit this vulnerability by convincing a user to use a specially crafted proxy auto-configuration file. When the malicious file is processed by the .Net Framework, the lack of input validation could allow the attacker to inject arbitrary code into the application currently running on the system and take control of the affected system.Workaround - Configure Internet Explorer not to use WPAD
- Register WPAD
- Do not rely on the default web proxy settings in your .NET application
5. Microsoft .NET Framework WPF Reflection Optimization Arbitrary Code Execution Vulnerability
(
CVE-2012-4777
)
This vulnerability exists due to improper handling of user-supplied data processed by the .NET Framework, resulting the affected software performs insufficient validation of permissions on objects performing Windows Presentation Foundation (WPF) reflection optimization. A remote attacker could exploit the vulnerability by hosting an Extensible Application Markup Language (XAML) browser application (XBAP) and convincing a user to visit the malicious website. When the malicious XBAP is processed, untrusted data is treated as trusted, which could lead to an error condition that could allow an attacker to bypass security restrictions and execute arbitrary code on the affected system with the privileges of the user or bypass CAS restrictions.Workaround - Disable XAML browser applications in Internet Explorer
Solution
Apply appropriate patches as mentioned in Microsoft Security Bulletin
MS12-074
Vendor Information
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms12-074
References
Microsoft
http://technet.microsoft.com/en-us/security/bulletin/ms12-074
SecurityFocus
http://www.securityfocus.com/bid/56455
http://www.securityfocus.com/bid/56456
http://www.securityfocus.com/bid/56462
http://www.securityfocus.com/bid/56463
http://www.securityfocus.com/bid/56464
Cisco
http://www.cisco.com/web/about/security/intelligence/ERP_nov12.html
CVE Name
CVE-2012-1895
CVE-2012-1896
CVE-2012-2519
CVE-2012-4776
CVE-2012-4777
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|