MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2651026)

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The .NET Framework install on the remote Windows host could allow
arbitrary code execution.

Description :

The version of the .NET Framework installed on the remote host
reportedly is affected by the following vulnerabilities :

- The .NET Framework and Silverlight do not properly use
unmanaged objects, which could allow a malicious .NET
Framework application to access memory in an unsafe
manner. (CVE-2012-0014)

- The .NET Framework does not properly calculate a buffer
length when processing malicious input, which could
lead to heap corruption. (CVE-2012-0015)

An attacker may be able to leverage these vulnerabilities to execute
arbitrary code on the affected system if a user on it can be tricked
into viewing a specially crafted web page using a web browser that can
run XAML Browser Applications (XBAPs) or Silverlight applications.

See also :

Solution :

Microsoft has released a set of patches for .NET Framework 2.0, 3.5.1,
and 4 as well as Silverlight 4.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true

Family: Windows : Microsoft Bulletins

Nessus Plugin ID: 57950 ()

Bugtraq ID: 51938

CVE ID: CVE-2012-0014

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now