SB2018071011 - Multiple vulnerabilities in Microsoft .NET Framework and ASP.NET
Published: July 10, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2018-8284)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper input validation by the Microsoft .NET Framework. A remote unauthenticated attacker can pass specific input to an application utilizing susceptible .Net methods, inject and execute arbitrary code with elevated privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Improper input validation (CVE-ID: CVE-2018-8260)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to improper checking of the source markup of a file. A remote unauthenticated attacker can trick the victim into opening a specially crafted file with an affected version of .NET, inject and run arbitrary code in the context of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Privilege escalation (CVE-ID: CVE-2018-8202)
The vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to improper activation of COM objects by .NET Framework. A local attacker can run a malicious program and gain elevated privileges to conduct further attacks.
4) Security restrictions bypass (CVE-ID: CVE-2018-8356)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.
The vulnerability exists due to improper validation of certificates by .NET Framework components. A remote unauthenticated attacker can present expired certificates when challenged and bypass security restrictions to conduct further attacks.
5) Security restrictions bypass (CVE-ID: CVE-2018-8171)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.Remediation
Install update from vendor's website.
References
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8284
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8260
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8202
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8356
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8171