HTTP: .NET XML Digital Signature Spoofing

This signature detects attempts to exploit a known vulnerability in Microsoft's .NET Framework. An attacker can successfully exploit the vulnerability and modify the contents of an XML file without invalidating the file's signature and could gain access to endpoint functions authenticated user.

Extended Description

The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check signatures, which allows remote attackers to make undetected changes to signed XML documents via unspecified vectors that preserve signature validity, aka "XML Digital Signature Spoofing Vulnerability."

Affected Products

Microsoft .net_framework

References

CVE: CVE-2013-1336

Short Name
HTTP:STC:DOTNET-XML-SIG-SPOOF
Severity
Minor
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
.NET CVE-2013-1336 Digital Signature Spoofing XML
Release Date
05/14/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3761
False Positive
Unknown
Vendors

Microsoft

CVSS Score

5.0

Found a potential security threat?