|
|||
Rule General Information |
---|
Release Date: | 2012-12-13 | |
Rule Name: | Microsoft .NET Framework Heap Buffer Overflow Vulnerability -3 (CVE-2012-0163) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly validate function parameters, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Parameter Validation Vulnerability." | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | MicrosoftSecurityBulletin:MS12-025 SecurityTrackerID:1026907 |
|
Solutions |
---|
Microsoft has released a patch MS12-025 to eliminate the vulnerability. The patch can be downloaded at http://technet.microsoft.com/security/bulletin/MS12-025 |