MS14-009: Vulnerabilities in .NET Framework Could Allow Privilege Escalation (2916607)

High Nessus Plugin ID 72432

Synopsis

The version of the .NET Framework installed on the remote host is affected by multiple vulnerabilities.

Description

The remote Windows host is running a version of the Microsoft .NET Framework that is affected by multiple vulnerabilities :

- An error exists related to handling stale or closed HTTP client connections that can allow denial of service attacks. (CVE-2014-0253)

- An error exists related to decisions regarding the safety of executing certain methods that can allow privilege escalation. (CVE-2014-0257)

- An error exists related to the component 'VSAVB7RT' that can allow Address Space Layout Randomization (ASLR) bypasses. (CVE-2014-0295)

Solution

Microsoft has released a set of patches for .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4.0, 4.5, and 4.5.1.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2014/ms14-009

Plugin Details

Severity: High

ID: 72432

File Name: smb_nt_ms14-009.nasl

Version: 1.17

Type: local

Agent: windows

Published: 2014/02/12

Updated: 2018/11/15

Dependencies: 57033, 51351, 13855

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/02/11

Vulnerability Publication Date: 2014/02/11

Exploitable With

Metasploit (MS14-009 .NET Deployment Service IE Sandbox Escape)

Reference Information

CVE: CVE-2014-0253, CVE-2014-0257, CVE-2014-0295

BID: 65415, 65417, 65418