Microsoft .NET Framework Remote Code Execution Vulnerabilities (931212)

medium Nessus Network Monitor Plugin ID 4119

Synopsis

The remote .NET Framework is vulnerable to code execution attack.

Description

The remote host is running a version of the ASP.NET framework that contains multiple vulnerabilities :

- PE Loader Vulnerability: could allow an attacker to execute arbitrary code with the privilege of the logged-on user;

- ASP.NET NULL Byte Termination Vulnerability: could allow an attacker to retrieve the content of the web server;

- JIT Compiler Vulnerability: could allow an attacker to execute arbitrary code with the privilege of the logged-on user.

Solution

Microsoft has released a set of patches for .NET Framework 1.0, 1.1 and 2.0.

See Also

http://www.microsoft.com/technet/security/bulletin/ms07-040.mspx

Plugin Details

Severity: Medium

ID: 4119

Family: CGI

Published: 7/11/2007

Updated: 3/6/2019

Nessus ID: 25691

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework

Reference Information

CVE: CVE-2007-0041, CVE-2007-0042, CVE-2007-0043

BID: 24778, 24791, 24811