The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Microsoft .NET Framework

computer vulnerability announce CVE-2016-3255

Microsoft .NET: external XML entity injection

Synthesis of the vulnerability

An attacker can transmit malicious XML data to Microsoft .NET, in order to read a file, scan sites, or trigger a denial of service.
Impacted products: .NET Framework.
Severity: 2/4.
Consequences: data reading, denial of service on service.
Provenance: document.
Creation date: 12/07/2016.
Identifiers: 3170048, CERTFR-2016-AVI-232, CVE-2016-3255, MS16-091, VIGILANCE-VUL-20087.

Description of the vulnerability

XML data can contain external entities (DTD):
  <!ENTITY name SYSTEM "file">
  <!ENTITY name SYSTEM "http://server/file">
A program which reads these XML data can replace these entities by data coming from the indicated file. When the program uses XML data coming from an untrusted source, this behavior leads to:
 - content disclosure from files of the server
 - private web site scan
 - a denial of service by opening a blocking file
This feature must be disabled to process XML data coming from an untrusted source.

However, the Microsoft .NET parser allows external entities.

An attacker can therefore transmit malicious XML data to Microsoft .NET, in order to read a file, scan sites, or trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2016-0149

Microsoft .NET: Man-in-the-Middle

Synthesis of the vulnerability

An attacker can act as a Man-in-the-Middle on Microsoft .NET, in order to read or write data in the session.
Impacted products: .NET Framework, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: data reading, data creation/edition.
Provenance: internet server.
Creation date: 10/05/2016.
Identifiers: 3156757, CERTFR-2016-AVI-165, CVE-2016-0149, MS16-065, VIGILANCE-VUL-19588.

Description of the vulnerability

The Microsoft .NET product uses the TLS protocol, in order to create secure sessions.

However, injecting clear text packets disrupt the encrypted session.

An attacker can therefore act as a Man-in-the-Middle on Microsoft .NET, in order to read or write data in the session.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2016-0148

Microsoft .NET: code execution via api-ms-win-appmodel-runtime-l1-1-0.dll

Synthesis of the vulnerability

A local attacker can force a malicious library load by an application using Microsoft .NET, in order to run code.
Impacted products: .NET Framework.
Severity: 3/4.
Consequences: user access/rights.
Provenance: document.
Creation date: 12/04/2016.
Revision date: 13/04/2016.
Identifiers: 3148789, CERTFR-2016-AVI-125, CVE-2016-0148, MS16-041, VIGILANCE-VUL-19356, ZDI-16-234.

Description of the vulnerability

The Microsoft .NET product loads external libraries.

However, it loads the DLL api-ms-win-appmodel-runtime-l1-1-0.dll directory from its current directory.

This vulnerability can be exploited via VIGILANCE-VUL-19052 using Microsoft PowerPoint Viewer.

A local attacker can therefore force a malicious library load by an application using Microsoft .NET, in order to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2016-0143 CVE-2016-0145 CVE-2016-0165

Windows, .NET, Office, Skype, Lync: four vulnerabilities of Graphics Component

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Graphics Component of Windows, .NET, Office, Skype, Lync.
Impacted products: Lync, .NET Framework, Office, Access, Office Communicator, Excel, OneNote, Outlook, PowerPoint, Project, Publisher, Visio, Word, Skype for Business, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 4/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 4.
Creation date: 12/04/2016.
Identifiers: 3148522, 684, 707, CERTFR-2016-AVI-122, CERTFR-2016-AVI-123, CVE-2016-0143, CVE-2016-0145, CVE-2016-0165, CVE-2016-0167, MS16-039, VIGILANCE-VUL-19354.

Description of the vulnerability

Several vulnerabilities were announced in Windows, .NET, Office, Skype, Lync.

An attacker can bypass security features in Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-0143]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2016-0145]

An attacker can bypass security features in Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-0165]

An attacker can bypass security features in Win32k, in order to escalate his privileges. [severity:2/4; CVE-2016-0167]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2016-0132

Microsoft .NET: bypassing XML signature

Synthesis of the vulnerability

An attacker can alter an XML document, which is not detected as modified by Microsoft .NET.
Impacted products: .NET Framework, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: data creation/edition.
Provenance: document.
Creation date: 08/03/2016.
Identifiers: 3141780, CERTFR-2016-AVI-091, CVE-2016-0132, MS16-035, VIGILANCE-VUL-19133.

Description of the vulnerability

The Microsoft .NET product can check the signature of an XML document.

However, even if an attacker alters a document, Microsoft .NET indicates that the signature is still valid.

An attacker can therefore alter an XML document, which is not detected as modified by Microsoft .NET.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2016-0033 CVE-2016-0047

Microsoft .NET: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft .NET.
Impacted products: .NET Framework, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: data reading, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 09/02/2016.
Identifiers: 3137893, CERTFR-2016-AVI-058, CVE-2016-0033, CVE-2016-0047, MS16-019, VIGILANCE-VUL-18909.

Description of the vulnerability

Several vulnerabilities were announced in Microsoft .NET.

An attacker can trigger a loop in XSLT Transforms, in order to trigger a denial of service. [severity:2/4; CVE-2016-0033]

An attacker can bypass security features in Windows Forms, in order to obtain sensitive information. [severity:2/4; CVE-2016-0047]
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2015-6106 CVE-2015-6107 CVE-2015-6108

Windows, .NET, Office, Skype, Lync, Silverlight: three vulnerabilities of Graphics Component

Synthesis of the vulnerability

Several vulnerabilities were announced in Windows, .NET, Office, Skype, Lync and Silverlight.
Impacted products: Lync, .NET Framework, Office, Access, Office Communicator, Excel, OneNote, Outlook, PowerPoint, Project, Publisher, Visio, Word, Silverlight, Skype for Business, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 4/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 08/12/2015.
Identifiers: 3104503, CERTFR-2015-AVI-524, CVE-2015-6106, CVE-2015-6107, CVE-2015-6108, MS15-128, VIGILANCE-VUL-18471.

Description of the vulnerability

Several vulnerabilities were announced in Windows, .NET, Office, Skype, Lync and Silverlight.

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-6106]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-6107]

An attacker can generate a memory corruption, in order to trigger a denial of service, and possibly to run code. [severity:4/4; CVE-2015-6108]
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2015-6096 CVE-2015-6099 CVE-2015-6115

Microsoft .NET: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft .NET.
Impacted products: .NET Framework.
Severity: 2/4.
Consequences: client access/rights, data reading.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 10/11/2015.
Identifiers: 3104507, CERTFR-2015-AVI-475, CVE-2015-6096, CVE-2015-6099, CVE-2015-6115, MS15-118, VIGILANCE-VUL-18283.

Description of the vulnerability

Several vulnerabilities were announced in Microsoft .NET.

An attacker can transmit malicious XML data, in order to read a file, scan sites, or trigger a denial of service. [severity:2/4; CVE-2015-6096]

An attacker can trigger a Cross Site Scripting, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2015-6099]

An attacker can guess the memory layout of a process, to bypass ASLR, in order to ease the next step of an attack. [severity:2/4; CVE-2015-6115]
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2015-2504 CVE-2015-2526

Microsoft .NET: two vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft .NET.
Impacted products: .NET Framework, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 3/4.
Consequences: privileged access/rights, user access/rights, denial of service on service.
Provenance: document.
Number of vulnerabilities in this bulletin: 2.
Creation date: 08/09/2015.
Identifiers: 3089662, CERTFR-2015-AVI-374, CVE-2015-2504, CVE-2015-2526, MS15-101, VIGILANCE-VUL-17848.

Description of the vulnerability

Several vulnerabilities were announced in Microsoft .NET.

An attacker can bypass security features, in order to escalate his privileges. [severity:3/4; CVE-2015-2504]

An attacker can trigger a fatal error in MVC, in order to trigger a denial of service. [severity:2/4; CVE-2015-2526]
Full Vigil@nce bulletin... (Free trial)

vulnerability announce CVE-2015-2479 CVE-2015-2480 CVE-2015-2481

Microsoft .NET: three vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of Microsoft .NET.
Impacted products: .NET Framework, Windows 10, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, user access/rights.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 11/08/2015.
Identifiers: 3086251, CERTFR-2015-AVI-346, CVE-2015-2479, CVE-2015-2480, CVE-2015-2481, MS15-092, VIGILANCE-VUL-17642.

Description of the vulnerability

Several vulnerabilities were announced in Microsoft .NET.

An attacker can bypass security features in RyuJIT Optimization, in order to escalate his privileges. [severity:2/4; CVE-2015-2479]

An attacker can bypass security features in RyuJIT Optimization, in order to escalate his privileges. [severity:2/4; CVE-2015-2480]

An attacker can bypass security features in RyuJIT Optimization, in order to escalate his privileges. [severity:2/4; CVE-2015-2481]
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Microsoft .NET Framework: