Security Updates for Microsoft .NET Framework (July 2018)

Critical Nessus Plugin ID 110990

Synopsis

The Microsoft .NET Framework installation on the remote host is affected by multiple vulnerabilities.

Description

The Microsoft .NET Framework installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :

- An elevation of privilege vulnerability exists in .NET Framework which could allow an attacker to elevate their privilege level. (CVE-2018-8202)

- A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly. An attacker who successfully exploited this vulnerability could take control of an affected system.
An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
(CVE-2018-8284)

- A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates. An attacker could present expired certificates when challenged. The security update addresses the vulnerability by ensuring that .NET Framework components correctly validate certificates.
(CVE-2018-8356)

- A Remote Code Execution vulnerability exists in .NET software when the software fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
(CVE-2018-8260)

Solution

Microsoft has released security updates for Microsoft .NET Framework.

See Also

http://www.nessus.org/u?6871a6a2

http://www.nessus.org/u?d62bcc3d

http://www.nessus.org/u?5af81d47

http://www.nessus.org/u?d75a65af

http://www.nessus.org/u?44f66a8b

http://www.nessus.org/u?d144042d

http://www.nessus.org/u?df31c224

http://www.nessus.org/u?e6a3fb46

http://www.nessus.org/u?8908e951

http://www.nessus.org/u?a23712fe

http://www.nessus.org/u?5f015bf2

http://www.nessus.org/u?b9bfc0c9

http://www.nessus.org/u?ce3ef6dc

http://www.nessus.org/u?50b55edf

http://www.nessus.org/u?8bd31c0d

http://www.nessus.org/u?72e0da05

http://www.nessus.org/u?c0096c91

http://www.nessus.org/u?564bab5a

http://www.nessus.org/u?17109616

http://www.nessus.org/u?5e822fc3

http://www.nessus.org/u?8b6b59b3

http://www.nessus.org/u?a0a3fc8a

http://www.nessus.org/u?454614d0

http://www.nessus.org/u?3c803961

http://www.nessus.org/u?6a189799

Plugin Details

Severity: Critical

ID: 110990

File Name: smb_nt_ms18_jul_dotnet.nasl

Version: 1.4

Type: local

Agent: windows

Published: 2018/07/10

Modified: 2018/09/17

Dependencies: 13855, 51351, 57033, 99364

Risk Information

Risk Factor: Critical

CVSS Score Source: manual

CVSS Score Rationale: Nvd score unavailable. assigned cvss score for remote code execution vulnerability.

CVSSv2

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSSv3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Patch Publication Date: 2018/07/10

Vulnerability Publication Date: 2018/07/10

Reference Information

CVE: CVE-2018-8202, CVE-2018-8260, CVE-2018-8284, CVE-2018-8356

BID: 104664, 104665, 104666, 104667

MSKB: 4338606, 4338605, 4338604, 4338602, 4338601, 4338600, 4338423, 4338422, 4338421, 4338420, 4338424, 4338819, 4338416, 4338417, 4338415, 4338418, 4338419, 4338610, 4338611, 4338612, 4338613, 4338829, 4338826, 4338825, 4338814

MSFT: MS18-4338606, MS18-4338605, MS18-4338604, MS18-4338602, MS18-4338601, MS18-4338600, MS18-4338423, MS18-4338422, MS18-4338421, MS18-4338420, MS18-4338424, MS18-4338819, MS18-4338416, MS18-4338417, MS18-4338415, MS18-4338418, MS18-4338419, MS18-4338610, MS18-4338611, MS18-4338612, MS18-4338613, MS18-4338829, MS18-4338826, MS18-4338825, MS18-4338814