|
|
| |
Credit:
The information has been provided by James Forshaw.
The original article can be found at: http://www.securityfocus.com/bid/53356
|
| |
Vulnerable Systems:
* Microsoft .NET Framework 3.5.1
* Microsoft .NET Framework 4.0
* Microsoft .NET Framework 3.5 SP1
* Microsoft .NET Framework 3.5
* Microsoft .NET Framework 3.0 SP2
* Microsoft .NET Framework 2.0 SP2
* Microsoft .NET Framework 2.0 SP1
* Microsoft .NET Framework 1.1 SP1
* Microsoft .NET Framework 1.0 SP3
* Microsoft .NET Framework 1.0 SP2
* Microsoft .NET Framework 1.0 SP1
An attacker can exploit this issue by enticing an unsuspecting victim to run a malicious .NET application or visit a site that hosts the malicious content as an Extensible Application Markup Language (XAML) browser application. This will allow attackers to break out of the Code Access Security (CAS) sandbox. Successful exploits may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed attacks will cause denial-of-service conditions.
Vendor Status:
Microsoft had issued an update for this vulnerability
Patch Availability:
http://technet.microsoft.com/en-us/security/bulletin/MS12-035
CVE Information:
CVE-2012-0160
Disclosure Timeline:
Initial Release :May 08 2012
|
|
|