Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine whether it is safe to execute a method, which allows remote attackers to execute arbitrary code via (1) a crafted web site or (2) a crafted .NET Framework application that exposes a COM server endpoint, aka "Type Traversal Vulnerability."
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1029745 | vdb entry |
http://www.exploit-db.com/exploits/33892 | exploit |
http://www.securityfocus.com/bid/65417 | vdb entry |
http://packetstormsecurity.com/files/127246/MS14-009-.NET-Deployment-Service-IE-Sandbox-Escape.html | |
http://www.osvdb.org/103163 | vdb entry |
http://secunia.com/advisories/56793 | third party advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-009 | vendor advisory |