S.DS.P buffer overflow vulnerability in the Windows Forms in Microsoft .NET FrameworkID: oval:org.secpod.oval:def:8339 | Date: (C)2013-01-10 (M)2023-12-14 |
Class: VULNERABILITY | Family: windows |
The host is installed with Microsoft .NET Framework 2.0 SP2, 3.0, 3.5.1, 4 or 4.5 and is prone to S.DS.P buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle System.DirectoryServices.Protocols (S.DS.P) namespace method. Successful exploitation allows remote attackers to install programs, view, change or delete data or create new accounts with full user rights.
Platform: |
Microsoft Windows 7 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Vista |
Microsoft Windows XP |
Microsoft Windows 8 |
Microsoft Windows Server 2012 |
Product: |
Microsoft .NET Framework 3.5.1 |
Microsoft .NET Framework 2.0 |
Microsoft .NET Framework 3.0 |
Microsoft .NET Framework 4.0 |
Microsoft .NET Framework 4.5 |