HTTP: Microsoft .NET Framework XAML Browser Applications Stack Corruption1

This signature detects attempts to exploit a known vulnerability against Microsoft .NET Framework. It is due to memory corruption when handling method calls that take structures with misaligned fields as parameters. Remote attackers could exploit this vulnerability by either enticing target users to visit a malicious web page containing an XBAP (XAML browser application), or by uploading an ASP.NET application to a vulnerable server. Successful exploitation could result in execution of arbitrary code within the security context of the currently logged on user. An unsuccessful exploit attempt may terminate the PresentationHost.exe .NET component.

Short Name
HTTP:MS-DOT-NET-XAML-RCE1
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
.NET Applications Browser Corruption1 Framework Microsoft Stack XAML
Release Date
10/07/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3324
False Positive
Unknown

Found a potential security threat?