// For flags

CVE-2008-5100

 

Severity Score

9.1
*CVSS v3

Exploit Likelihood

28.6%
*EPSS

Affected Versions

1
*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attackers to bypass Global Assembly Cache (GAC) and Code Access Security (CAS) protection mechanisms, aka MSRC ticket MSRC8566gs.

La implementación de strong name (nombre fuerte) (SN) en Microsoft .NET Framework 2.0.50727 confía en la firma digital Public Key Token embebida en la ruta de un archivo DLL en vez de en la firma digital de este mismo archivo, lo que facilita a los atacantes evitar los mecanismos de protección Global Assembly Cache (GAC) y Code Access Security (CAS), también conocidos como MSRC8566gs.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-11-17 CVE Reserved
  • 2008-11-17 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-310: Cryptographic Issues
CAPEC
Affected Vendors, Products, and Versions (1)