SynopsisThe .NET Framework install on the remote Windows host could allow arbitrary code execution.
DescriptionThe version of the .NET Framework installed on the remote host is reportedly affected by the following vulnerabilities :
- A vulnerability exists in the way that affected components handle specially crafted TrueType font files that could lead to remote code execution. An attacker could leverage this issue by enticing a user to open a specially crafted TrueType font file.
- The .NET Framework does not properly handle multidimensional arrays of small structures, which could lead to remote code execution. (CVE-2013-3131)
- The .NET Framework does not properly validate the permissions of certain objects performing reflection.
This could allow an attacker to elevate their privileges and take complete control of the system.
- The .NET Framework does not properly validate the permissions of objects involved with reflection, which could lead to an elevation of privileges.
- The .NET Framework is affected by a remote code execution vulnerability due to the way in which it allocates arrays of small structures. (CVE-2013-3134)
- The .NET Framework does not properly validate the permissions for delegate objects during serialization, which could lead to an elevation of privileges.
- Microsoft Silverlight does not properly handle null pointers, which could lead to remote code execution.
An attacker may be able to leverage these vulnerabilities to execute arbitrary code on the affected system if a user can be tricked into viewing a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications.
SolutionMicrosoft has released a set of patches for .NET Framework 1.0, 1.1, 2.0, 3.0, 3.5, 3.5.1, 4.0, and 4.5 as well as Silverlight 5.