CERT-In Vulnerability Note
CIVN-2014-0226
Multiple Remote Code Execution Vulnerabilities in Microsoft .NET Framework
Original Issue Date:October 15, 2014
Severity Rating: HIGH
Systems Affected
- Windows Server 2003, x64 Edition and Itanium-based Systems SP2
- Windows Vista and x64 Edition SP2
- Windows Server 2008 for 32-bit, x64-based Systems and Itanium-based Systems SP2
- Windows 7 for 32-bit and x64-based Systems SP1
- Windows Server 2008 R2 for x64-based Systems and Itanium-based Systems SP1
- Windows 8 for 32-bit and x64-based Systems
- Windows 8.1 for 32-bit and x64-based Systems
- Windows Server 2012
- Windows Server 2012 R2
- Windows RT
- Windows RT 8.1
- Windows Server 2008 R2 for x64-based Systems SP1 (Server Core installation)
- Windows Server 2012 (Server Core installation)
- Windows Server 2012 R2 (Server Core installation)
Component Affected
- Microsoft .NET Framework 2.0 SP2
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4.0
- Microsoft .NET Framework 4.5
- Microsoft .NET Framework 4.5.1
- Microsoft .NET Framework 4.5.2
Overview
Multiple vulnerabilities have been reported in Microsoft .NET Framework which could be exploited by a remote attacker to gain elevated privileges, bypass security feature or allow remote code execution attacks on the affected system.
Description
1. Privilege Elevation Vulnerability in .NET ClickOnce
(
CVE-2014-4073
)
A privilege elevation vulnerability exists in the ClickOnce component of Microsoft .NET Framework due to unintentional processing of data prior to verification. A remote attacker could exploit this vulnerability by allowing the ClickOnce installer process to run outside of Protected Mode leading to elevation of privileges. Successful exploitation could allow the attacker to completely compromise the affected system by installing programs, viewing, modifying or deleting data, or creating new accounts with full user rights.
2. Remote Code Execution Vulnerability in .NET Framework
(
CVE-2014-4121
)
A remote code execution vulnerability exists in Microsoft .NET Framework due to improper parsing of a crafted URI request containing international characters. A remote attacker could exploit this vulnerability by sending crafted URI request to the targeted system. Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code on the target system in context of logged in user to view, change, delete data or create new account.
3. Security feature bypass Vulnerability in .NET ASLR
(
CVE-2014-4122
)
A security feature bypass vulnerability exists in the Microsoft .NET Framework due to improper implementation of Address Space Layout Randomization (ASLR) security feature. A remote attacker could exploit this vulnerability by convincing the user to visit a specially crafted webpage to bypass ASLR security feature. The attacker could use the ASLR vulnerability in conjunction with another vulnerability to conduct further attacks.
Workaround
- Disable iriParsing for .NET 4.0 and below applications
- Install the Force ASLR feature hotfix and enable the IFEO registry entry
Solution
Apply appropriate updates as mentioned in the Microsoft Security Bulletin
MS14-057
Vendor Information
Microsoft
https://technet.microsoft.com/en-us/library/security/ms14-057
References
Microsoft
https://technet.microsoft.com/en-us/library/security/ms14-057
Cisco
http://tools.cisco.com/security/center/viewAlert.x?alertId=35981
http://tools.cisco.com/security/center/viewAlert.x?alertId=35982
http://tools.cisco.com/security/center/viewAlert.x?alertId=35983
Security Tracker
http://www.securitytracker.com/id/1031021
CVE Name
CVE-2014-4073
CVE-2014-4121
CVE-2014-4122
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-24368572
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|