HTTP: Microsoft .NET Framework Serialization Remote Code Execution

This signature detects attempts to exploit a known vulnerability against .NET Framework. A successful attack can lead to arbitrary code execution.

Extended Description

Microsoft .NET Framework is prone to a remote code-execution vulnerability. An attacker can exploit this issue by enticing an unsuspecting victim to run a malicious .NET application or visit a site that hosts the malicious content as an Extensible Application Markup Language (XAML) browser application. This will allow attackers to break out of the Code Access Security (CAS) sandbox. Successful exploits may allow an attacker to execute arbitrary code with the privileges of the currently logged-in user. Failed attacks will cause denial-of-service conditions.

Affected Products

Avaya messaging_application_server,Microsoft .net_framework

References

BugTraq: 53356

CVE: CVE-2012-0160

Short Name
HTTP:STC:DOTNET-SERIALIZATION
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
.NET CVE-2012-0160 Code Execution Framework Microsoft Remote Serialization bid:53356
Release Date
05/07/2012
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Microsoft

Avaya

CVSS Score

9.3

Found a potential security threat?