[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2012-0161

Date: (C)2012-05-08   (M)2017-09-22
 
CVSS Score: 9.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5 SP1, 3.5.1, and 4 does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Serialization Vulnerability."

Reference:
SECTRACK-1027036
SECUNIA-49117
BID-53357
MS12-035
TA12-129A

CPE    7
cpe:/a:microsoft:.net_framework:1.0:sp3
cpe:/a:microsoft:.net_framework:3.5:sp1
cpe:/a:microsoft:.net_framework:1.1:sp1
cpe:/a:microsoft:.net_framework:3.0:sp2
...
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:5586
oval:org.secpod.oval:def:5589

© 2013 SecPod Technologies