CVE-2014-4062
https://notcve.org/view.php?id=CVE-2014-4062
Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, and 3.5.1 does not properly implement the ASLR protection mechanism, which allows remote attackers to obtain sensitive address information via a crafted web site, aka ".NET ASLR Vulnerability." Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5, y 3.5.1 no implementa debidamente el mecanismo de protección ASLR, lo que permite a atacantes remotos obtener información sensible de direcciones a través de un sitio web manipulado, también conocido como 'vulnerabilidad de .NET ASLR.' • http://www.securityfocus.com/bid/69145 http://www.securitytracker.com/id/1030721 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-046 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2014-1806 – .NET Remoting Services - Remote Command Execution
https://notcve.org/view.php?id=CVE-2014-1806
The .NET Remoting implementation in Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly restrict memory access, which allows remote attackers to execute arbitrary code via vectors involving malformed objects, aka "TypeFilterLevel Vulnerability." La implementación .NET Remoting en Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5 y 4.5.1 no restringe debidamente acceso a memoria, lo que permite a atacantes remotos ejecutar código arbitrario a través de vectores involucrando objetos malformados, también conocido como 'vulnerabilidad de TypeFilterLevel.' • https://www.exploit-db.com/exploits/35280 http://www.securityfocus.com/bid/67286 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-026 • CWE-94: Improper Control of Generation of Code ('Code Injection') •
CVE-2014-0253
https://notcve.org/view.php?id=CVE-2014-0253
Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumption for a (1) stale or (2) closed connection, as exploited in the wild in February 2014, aka "POST Request DoS Vulnerability." Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5 y 4.5.1 no determina adecuadamente los estados de conexión TCP, lo que permite a atacantes remotos causar una denegación de servicio (cuelgue del demonio ASP.NET) a través de solicitudes HTTP manipuladas que provocan el persistente consumo de recursos para una conexión (1) obsoleta o (2) cerrada, tal y como fue explotado activamente en febrero 2014, también conocido como "POST Request DoS Vulnerability." • http://osvdb.org/103162 http://secunia.com/advisories/56793 http://www.securityfocus.com/bid/65415 http://www.securitytracker.com/id/1029745 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-009 • CWE-20: Improper Input Validation •
CVE-2014-0257 – Microsoft .NET Deployment Service - IE Sandbox Escape (MS14-009)
https://notcve.org/view.php?id=CVE-2014-0257
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote attackers to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework application that exposes a COM server endpoint, aka "Type Traversal Vulnerability." Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5 y 4.5.1 no determina adecuadamente si es seguro ejecutar un método, lo que permite a atacantes remotos ejecutar código arbitrario a través de (1) un sitio web manipulado o (2) una aplicación .NET Framework manipulada que expone un servidor COM, también conocido como "Type Traversal Vulnerability." • https://www.exploit-db.com/exploits/33892 http://packetstormsecurity.com/files/127246/MS14-009-.NET-Deployment-Service-IE-Sandbox-Escape.html http://secunia.com/advisories/56793 http://www.exploit-db.com/exploits/33892 http://www.osvdb.org/103163 http://www.securityfocus.com/bid/65417 http://www.securitytracker.com/id/1029745 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-009 https://github.com/tyranid/IE11SandboxEscapes • CWE-20: Improper Input Validation •
CVE-2013-3132
https://notcve.org/view.php?id=CVE-2013-3132
Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check the permissions of objects that use reflection, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application, aka "Delegate Reflection Bypass Vulnerability." Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, y 4.5, no valida adecuadamente los permisos de los objetos que usan el reflejo (reflection), lo que permite a atacantes remotos ejecutar código de su elección a través de (1) una aplicación manipulada para navegadores XAML (XBAP) o (2)una aplicación .NET Framework. Aka "Delegate Reflection Bypass Vulnerability." • http://www.us-cert.gov/ncas/alerts/TA13-190A https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-052 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17430 • CWE-94: Improper Control of Generation of Code ('Code Injection') •