Microsoft .NET Framework 2.0 SP2 and 3.5.1 does not properly consider trust levels during construction of output data, which allows remote attackers to obtain sensitive information via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka "Code Access Security Info Disclosure Vulnerability."
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/56456 | vdb entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15785 | vdb entry signature |
http://www.us-cert.gov/cas/techalerts/TA12-318A.html | third party advisory us government resource |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-074 | vendor advisory |
http://secunia.com/advisories/51236 | third party advisory |
http://www.securitytracker.com/id?1027753 | vdb entry |