Security Updates for Microsoft .NET Framework (August 2023)

high Nessus Plugin ID 179664

Synopsis

The Microsoft .NET Framework installation on the remote host is missing a security update.

Description

The Microsoft .NET Framework installation on the remote host is missing a security update. It is, therefore, affected by multiple vulnerabilities, as follows:

- A remote code execution vulnerability in applications running on IIS using their parent application's Application Pool which can lead to privilege escalation and other security bypasses. (CVE-2023-36899)

- A spoofing vulnerability where an unauthenticated remote attacker can sign ClickOnce deployments without a valid code signing certificate. (CVE-2023-36873)

Solution

Microsoft has released security updates for Microsoft .NET Framework.

See Also

http://www.nessus.org/u?31a7e1cb

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36873

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36899

https://support.microsoft.com/en-us/help/5028946

https://support.microsoft.com/en-us/help/5028947

https://support.microsoft.com/en-us/help/5028948

https://support.microsoft.com/en-us/help/5028950

https://support.microsoft.com/en-us/help/5028951

https://support.microsoft.com/en-us/help/5028952

https://support.microsoft.com/en-us/help/5028953

https://support.microsoft.com/en-us/help/5028954

https://support.microsoft.com/en-us/help/5028955

https://support.microsoft.com/en-us/help/5028956

https://support.microsoft.com/en-us/help/5028957

https://support.microsoft.com/en-us/help/5028958

https://support.microsoft.com/en-us/help/5028960

https://support.microsoft.com/en-us/help/5028961

https://support.microsoft.com/en-us/help/5028962

https://support.microsoft.com/en-us/help/5028963

https://support.microsoft.com/en-us/help/5028967

https://support.microsoft.com/en-us/help/5028968

https://support.microsoft.com/en-us/help/5028969

https://support.microsoft.com/en-us/help/5028970

https://support.microsoft.com/en-us/help/5028973

https://support.microsoft.com/en-us/help/5028974

https://support.microsoft.com/en-us/help/5028975

https://support.microsoft.com/en-us/help/5028976

https://support.microsoft.com/en-us/help/5028977

https://support.microsoft.com/en-us/help/5028978

https://support.microsoft.com/en-us/help/5028979

https://support.microsoft.com/en-us/help/5028980

https://support.microsoft.com/en-us/help/5028981

https://support.microsoft.com/en-us/help/5028982

Plugin Details

Severity: High

ID: 179664

File Name: smb_nt_ms23_aug_dotnet.nasl

Version: 1.3

Type: local

Agent: windows

Published: 8/10/2023

Updated: 9/15/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2023-36899

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/8/2023

Vulnerability Publication Date: 8/8/2023

Reference Information

CVE: CVE-2023-36873, CVE-2023-36899

IAVA: 2023-A-0406-S

MSFT: MS23-5028946, MS23-5028947, MS23-5028948, MS23-5028950, MS23-5028951, MS23-5028952, MS23-5028953, MS23-5028954, MS23-5028955, MS23-5028956, MS23-5028957, MS23-5028958, MS23-5028960, MS23-5028961, MS23-5028962, MS23-5028963, MS23-5028967, MS23-5028968, MS23-5028969, MS23-5028970, MS23-5028973, MS23-5028974, MS23-5028975, MS23-5028976, MS23-5028977, MS23-5028978, MS23-5028979, MS23-5028980, MS23-5028981, MS23-5028982

MSKB: 5028946, 5028947, 5028948, 5028950, 5028951, 5028952, 5028953, 5028954, 5028955, 5028956, 5028957, 5028958, 5028960, 5028961, 5028962, 5028963, 5028967, 5028968, 5028969, 5028970, 5028973, 5028974, 5028975, 5028976, 5028977, 5028978, 5028979, 5028980, 5028981, 5028982