[PCWorks] Microsoft .NET Framework JIT Compiler Vulnerability

  • From: "Clint Hamilton-PCWorks Admin" <PCWorks@xxxxxxxxxxxxxxxxxxxxxxxx>
  • To: "PCWorks@xxxxxxxxxxxxx" <pcworks@xxxxxxxxxxxxx>
  • Date: Wed, 13 Oct 2010 04:51:52 -0500

TITLE:
Microsoft .NET Framework JIT Compiler Vulnerability

Criticality level:  Highly critical
Impact:  System access
Where:  From remote

http://secunia.com/advisories/41751/

DESCRIPTION:
A vulnerability has been reported in Microsoft .NET Framework, 
which
can be exploited by malicious people to compromise a vulnerable
system.

The vulnerability is caused due to an unspecified error in the 
JIT
compiler while optimising code, which can be exploited to 
corrupt
memory when a user visits a web page hosting a specially 
crafted XBAP
(XAML browser application).

Successful exploitation allows execution of arbitrary code.

NOTE: This can also be exploited to break out of the ASP.NET 
sandbox
with a specially crafted ASP.NET application.

The vulnerability only affects Microsoft .NET Framework 4.0 on 
the
x64 and Itanium architectures.

SOLUTION:
Apply patches.

ORIGINAL ADVISORY:
MS10-077 (KB2160841):
http://www.microsoft.com/technet/security/bulletin/MS10-077.mspx


=========================
The list's FAQ's can be seen by sending an email to 
PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line.

To unsubscribe, subscribe, set Digest or Vacation to on or off, go to 
//www.freelists.org/list/pcworks .  You can also send an email to 
PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line.  Your 
member list settings can be found at 
//www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks .  Once logged in, you have 
access to numerous other email options.  

The list archives are located at //www.freelists.org/archives/pcworks/ .  
All email posted to the list will be placed there in the event anyone needs to 
look for previous posts.
-zxdjhu-

Other related posts:

  • » [PCWorks] Microsoft .NET Framework JIT Compiler Vulnerability - Clint Hamilton-PCWorks Admin