Redgate .NET Reflector before 10.0.7.774 and SmartAssembly before 6.12.5 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific embedded resource file.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://documentation.red-gate.com/sa6/release-notes-and-other-versions/smartassembly-6-12-release-notes | release notes vendor advisory |
https://documentation.red-gate.com/ref10/release-notes-and-other-versions/net-reflector-10-0-release-notes | release notes vendor advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-code-execution-by-viewing-resource-files-in-.net-reflector/?research=Technical+advisories | third party advisory exploit |