MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution (2671605)

High Nessus Plugin ID 58657


The .NET Framework install on the remote Windows host could allow arbitrary code execution.


The version of the .NET Framework installed on the remote host reportedly is affected by a code execution vulnerability because of the way .NET Framework validates parameters when passing data to a function.

An attacker may be able to leverage these vulnerabilities to execute arbitrary code on the affected system if a user can be tricked into viewing a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be exploited by uploading a specially crafted ASP.NET page to a server system running IIS and then executing that page.


Microsoft has released a set of patches for .NET Framework 1.0, 1.1, 2.0, 3.5.1, and 4.

See Also

Plugin Details

Severity: High

ID: 58657

File Name: smb_nt_ms12-025.nasl

Version: $Revision: 1.20 $

Type: local

Agent: windows

Published: 2012/04/11

Modified: 2017/07/26

Dependencies: 57033, 13855

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/04/10

Vulnerability Publication Date: 2012/04/10

Reference Information

CVE: CVE-2012-0163

BID: 52921, 53204

OSVDB: 81133

EDB-ID: 18777

MSFT: MS12-025

MSKB: 2656368, 2656369, 2656370, 2656372, 2656373, 2656374, 2656376, 2656378