Security Updates for Microsoft .NET Framework (September 2019)

Low Nessus Plugin ID 128742

Synopsis

The Microsoft .NET Framework installation on the remote host is missing a security update.

Description

The Microsoft .NET Framework installation on the remote host is missing a security update. It is, therefore, affected by an elevation of privilege vulnerability, which exists when the .NET Framework common language runtime (CLR) allows file creation in arbitrary locations. An attacker who successfully exploited this vulnerability could write files to folders that require higher privileges than what the attacker already has.

Solution

Microsoft has released security updates for Microsoft .NET Framework.

See Also

http://www.nessus.org/u?27c04222

http://www.nessus.org/u?d723b476

http://www.nessus.org/u?4d02aa2b

http://www.nessus.org/u?1f1fdcfe

http://www.nessus.org/u?a9eb7193

http://www.nessus.org/u?6c93d5dd

http://www.nessus.org/u?9151db74

http://www.nessus.org/u?bc693427

http://www.nessus.org/u?f71ef8eb

http://www.nessus.org/u?9bddc45f

http://www.nessus.org/u?743596fe

http://www.nessus.org/u?d7d71b8f

http://www.nessus.org/u?6355fd6e

http://www.nessus.org/u?c7632e34

http://www.nessus.org/u?f1e01931

Plugin Details

Severity: Low

ID: 128742

File Name: smb_nt_ms19_sep_dotnet.nasl

Version: 1.4

Type: local

Agent: windows

Published: 2019/09/12

Updated: 2019/10/31

Dependencies: 99364, 57033, 51351, 13855

Risk Information

Risk Factor: Low

CVSS Score Source: CVE-2019-1142

CVSS v2.0

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Ease: No known exploits are available

Patch Publication Date: 2019/09/10

Vulnerability Publication Date: 2019/09/10

Reference Information

CVE: CVE-2019-1142

MSKB: 4514355, 4514354, 4514357, 4514356, 4514359, 4514604, 4514603, 4514601, 4516068, 4514599, 4516044, 4516058, 4516070, 4516066, 4514598

MSFT: MS19-4514355, MS19-4514354, MS19-4514357, MS19-4514356, MS19-4514359, MS19-4514604, MS19-4514603, MS19-4514601, MS19-4516068, MS19-4514599, MS19-4516044, MS19-4516058, MS19-4516070, MS19-4516066, MS19-4514598

IAVA: 2019-A-0339