MS12-016: Vulnerabilities in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution (2651026)

high Nessus Plugin ID 57950

Synopsis

The .NET Framework install on the remote Windows host could allow arbitrary code execution.

Description

The version of the .NET Framework installed on the remote host reportedly is affected by the following vulnerabilities :

- The .NET Framework and Silverlight do not properly use unmanaged objects, which could allow a malicious .NET Framework application to access memory in an unsafe manner. (CVE-2012-0014)

- The .NET Framework does not properly calculate a buffer length when processing malicious input, which could lead to heap corruption. (CVE-2012-0015)

An attacker may be able to leverage these vulnerabilities to execute arbitrary code on the affected system if a user on it can be tricked into viewing a specially crafted web page using a web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications.

Solution

Microsoft has released a set of patches for .NET Framework 2.0, 3.5.1, and 4 as well as Silverlight 4.

See Also

https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-016

Plugin Details

Severity: High

ID: 57950

File Name: smb_nt_ms12-016.nasl

Version: 1.18

Type: local

Agent: windows

Published: 2/14/2012

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_framework, cpe:/a:microsoft:silverlight

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/14/2012

Vulnerability Publication Date: 2/14/2012

Reference Information

CVE: CVE-2012-0014, CVE-2012-0015

BID: 51938, 51940