This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.
The version of ASP.NET Framework installed on the remote host is
affected by multiple vulnerabilities.
The remote Windows host is running a version of the Microsoft ASP.NET
Framework that has multiple vulnerabilities. These include:
- A flaw exists in the way ASP.NET generates hash tables
for user-supplied values. By sending a small number of
specially crafted posts to an ASP.NET server, an
attacker can take advantage of this flaw to cause a
denial of service condition. (CVE-2011-3414)
- The Framework does not properly validate return URLs
during the forms authentication process, which could
allow an attacker to redirect a victim to a malicious
- ASP.NET forms authentication contains a vulnerability
that could allow an attacker that already has a
registered user on an application to gain the
privileges of another known user. (CVE-2011-3416)
- An elevation of privilege vulnerability exists in the
way that ASP.NET Framework handles cached content when
Forms Authentication is used with sliding expiry. An
attacker can take advantage of this vulnerability to
execute code in the context of a target user by
tricking the user into visiting a specially crafted
See also :
Microsoft has released a set of patches for the .NET Framework on
Windows XP, 2003, Vista, 2008, 7, and 2008 R2.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 57414 ()
Bugtraq ID: 51186512015120251203
CVE ID: CVE-2011-3414CVE-2011-3415CVE-2011-3416CVE-2011-3417
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.