// For flags

CVE-2008-5100

 

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attackers to bypass Global Assembly Cache (GAC) and Code Access Security (CAS) protection mechanisms, aka MSRC ticket MSRC8566gs.

La implementación de strong name (nombre fuerte) (SN) en Microsoft .NET Framework 2.0.50727 confía en la firma digital Public Key Token embebida en la ruta de un archivo DLL en vez de en la firma digital de este mismo archivo, lo que facilita a los atacantes evitar los mecanismos de protección Global Assembly Cache (GAC) y Code Access Security (CAS), también conocidos como MSRC8566gs.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-11-17 CVE Reserved
  • 2008-11-17 CVE Published
  • 2023-08-08 EPSS Updated
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-310: Cryptographic Issues
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Microsoft
Search vendor "Microsoft"
.net Framework
Search vendor "Microsoft" for product ".net Framework"
2.0.50727
Search vendor "Microsoft" for product ".net Framework" and version "2.0.50727"
-
Affected