MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2651026)

High Nessus Plugin ID 57950


The .NET Framework install on the remote Windows host could allow arbitrary code execution.


The version of the .NET Framework installed on the remote host reportedly is affected by the following vulnerabilities :

- The .NET Framework and Silverlight do not properly use unmanaged objects, which could allow a malicious .NET Framework application to access memory in an unsafe manner. (CVE-2012-0014)

- The .NET Framework does not properly calculate a buffer length when processing malicious input, which could lead to heap corruption. (CVE-2012-0015)

An attacker may be able to leverage these vulnerabilities to execute arbitrary code on the affected system if a user on it can be tricked into viewing a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications.


Microsoft has released a set of patches for .NET Framework 2.0, 3.5.1, and 4 as well as Silverlight 4.

See Also

Plugin Details

Severity: High

ID: 57950

File Name: smb_nt_ms12-016.nasl

Version: $Revision: 1.14 $

Type: local

Agent: windows

Published: 2012/02/14

Modified: 2017/07/26

Dependencies: 13855, 57033, 42399

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:silverlight, cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/02/14

Vulnerability Publication Date: 2012/02/14

Reference Information

CVE: CVE-2012-0014, CVE-2012-0015

BID: 51938, 51940

OSVDB: 79260, 79261

MSFT: MS12-016

MSKB: 2668562, 2633869, 2638804, 2633870, 2633873, 2633879, 2633877, 2633874, 2633880