MS12-025: Vulnerability in .NET Framework Could Allow Remote Code Execution (2671605)

high Nessus Plugin ID 58657

Synopsis

The .NET Framework install on the remote Windows host could allow arbitrary code execution.

Description

The version of the .NET Framework installed on the remote host reportedly is affected by a code execution vulnerability because of the way .NET Framework validates parameters when passing data to a function.

An attacker may be able to leverage these vulnerabilities to execute arbitrary code on the affected system if a user can be tricked into viewing a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be exploited by uploading a specially crafted ASP.NET page to a server system running IIS and then executing that page.

Solution

Microsoft has released a set of patches for .NET Framework 1.0, 1.1, 2.0, 3.5.1, and 4.

See Also

https://www.akitasecurity.nl/advisory.html?id=AK20110801

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-025

Plugin Details

Severity: High

ID: 58657

File Name: smb_nt_ms12-025.nasl

Version: 1.24

Type: local

Agent: windows

Published: 4/11/2012

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/10/2012

Vulnerability Publication Date: 4/10/2012

Reference Information

CVE: CVE-2012-0163

BID: 52921, 53204