MS11-100: Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)

This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.

Synopsis :

The version of ASP.NET Framework installed on the remote host is
affected by multiple vulnerabilities.

Description :

The remote Windows host is running a version of the Microsoft ASP.NET
Framework that has multiple vulnerabilities. These include:

- A flaw exists in the way ASP.NET generates hash tables
for user-supplied values. By sending a small number of
specially crafted posts to an ASP.NET server, an
attacker can take advantage of this flaw to cause a
denial of service condition. (CVE-2011-3414)

- The Framework does not properly validate return URLs
during the forms authentication process, which could
allow an attacker to redirect a victim to a malicious
website. (CVE-2011-3415)

- ASP.NET forms authentication contains a vulnerability
that could allow an attacker that already has a
registered user on an application to gain the
privileges of another known user. (CVE-2011-3416)

- An elevation of privilege vulnerability exists in the
way that ASP.NET Framework handles cached content when
Forms Authentication is used with sliding expiry. An
attacker can take advantage of this vulnerability to
execute code in the context of a target user by
tricking the user into visiting a specially crafted
link. (CVE-2011-3417)

See also :

Solution :

Microsoft has released a set of patches for the .NET Framework on
Windows XP, 2003, Vista, 2008, 7, and 2008 R2.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 57414 ()

Bugtraq ID: 51186

CVE ID: CVE-2011-3414

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now