TITLE: Microsoft .NET Framework JIT Compiler Vulnerability Criticality level: Highly critical Impact: System access Where: From remote http://secunia.com/advisories/41751/ DESCRIPTION: A vulnerability has been reported in Microsoft .NET Framework, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified error in the JIT compiler while optimising code, which can be exploited to corrupt memory when a user visits a web page hosting a specially crafted XBAP (XAML browser application). Successful exploitation allows execution of arbitrary code. NOTE: This can also be exploited to break out of the ASP.NET sandbox with a specially crafted ASP.NET application. The vulnerability only affects Microsoft .NET Framework 4.0 on the x64 and Itanium architectures. SOLUTION: Apply patches. ORIGINAL ADVISORY: MS10-077 (KB2160841): http://www.microsoft.com/technet/security/bulletin/MS10-077.mspx ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-