ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6393 | vdb entry third party advisory signature |
http://www.us-cert.gov/cas/techalerts/TA09-223A.html | third party advisory us government resource |
http://www.vupen.com/english/advisories/2009/2231 | permissions required vdb entry third party advisory |
http://secunia.com/advisories/36127 | third party advisory |
http://blogs.technet.com/srd/archive/2009/08/11/ms09-035-asp-net-denial-of-service-vulnerability.aspx | vendor advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-036 | vendor advisory |
http://www.securitytracker.com/id?1022715 | vdb entry third party advisory |
http://osvdb.org/56905 | vdb entry broken link |
http://www.securityfocus.com/bid/35985 | vdb entry third party advisory patch |