TITLE: Microsoft .NET Framework WinForms Callback Handling Vulnerability Criticality level: Highly critical Impact: System access Where: From remote Software: Microsoft .NET Framework 2.x Microsoft .NET Framework 3.x Microsoft .NET Framework 4.x SECUNIA ADVISORY ID: http://secunia.com/advisories/52143/ DESCRIPTION: A vulnerability has been reported in Microsoft .NET Framework, which can be exploited by malicious people to compromise a user's system. The vulnerability is caused due to an error when handling permissions of a callback function when a certain WinForm object is created and can be exploited to bypass CAS (Code Access Security) restrictions via a specially crafted XAML Browser Application (XBAP) or an untrusted .NET application. Successful exploitation allows execution of arbitrary code. SOLUTION: Apply updates. ORIGINAL ADVISORY: MS13-015 (KB2789642, KB2789643, KB2789644, KB2789645, KB2789646, KB2789648, KB2789649, KB2789650): http://technet.microsoft.com/en-us/security/bulletin/ms13-015 ========================= The list's FAQ's can be seen by sending an email to PCWorks-request@xxxxxxxxxxxxx with FAQ in the subject line. To unsubscribe, subscribe, set Digest or Vacation to on or off, go to //www.freelists.org/list/pcworks . You can also send an email to PCWorks-request@xxxxxxxxxxxxx with Unsubscribe in the subject line. Your member list settings can be found at //www.freelists.org/cgi-bin/lsg2.cgi/l=pcworks . Once logged in, you have access to numerous other email options. The list archives are located at //www.freelists.org/archives/pcworks/ . All email posted to the list will be placed there in the event anyone needs to look for previous posts. -zxdjhu-