HTTP: Microsoft .NET Framework S.DS.P Namespace Method Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Microsoft .NET framework. A successful attack can lead to arbitrary code execution.

Extended Description

Buffer overflow in a System.DirectoryServices.Protocols (S.DS.P) namespace method in Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4, and 4.5 allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP) or (2) a crafted .NET Framework application that leverages a missing array-size check during a memory copy operation, aka "S.DS.P Buffer Overflow Vulnerability."

References

BugTraq: 57114

CVE: CVE-2013-0003

Short Name
HTTP:STC:MS-DOTNET-NAMESPACE-BO
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
.NET Buffer CVE-2013-0003 Framework Method Microsoft Namespace Overflow S.DS.P bid:57114
Release Date
08/22/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3735
False Positive
Unknown
CVSS Score

9.3

Found a potential security threat?