Avis du CERT RENATER

Par défaut, cette page vous affichera les derniers messages envoyés par le CERT RENATER à la communauté. Vous pouvez affiner par année ou par type de message. Si aucun critère n'est précisé, seuls les derniers messages sont affichés
Date : Wed, 15 Jun 2011 11:17:16 +0200
Type : VULN
Sujet : CERT-Renater : 2011/VULN430 (Microsoft : Critical Vulnerability in .NET Framework and Microsoft Silverlight Could Allow Remote Code Execution)
====================================================================
                                   CERT-Renater

                        Note d'Information No. 2011/VULN430
_____________________________________________________________________

DATE                      : 15/06/2011

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Windows XP, Windows Server 2003,
                Windows Vista, Windows Server 2008, Windows 7.

======================================================================
http://www.microsoft.com/technet/security/bulletin/MS11-039.mspx
_______________________________________________________________________

Microsoft Security Bulletin MS11-039 - Critical
Vulnerability in .NET Framework and Microsoft Silverlight Could Allow
Remote Code Execution (2514842)
Version: 1.0

General Information

Executive Summary
	
This security update resolves a privately reported vulnerability in
Microsoft .NET Framework and Microsoft Silverlight. The vulnerability
could allow remote code execution on a client system if a user views a
specially crafted Web page using a Web browser that can run XAML Browser
Applications (XBAPs) or Silverlight applications. Users whose accounts
are configured to have fewer user rights on the system could be less
impacted than users who operate with administrative user rights. The
vulnerability could also allow remote code execution on a server system
running IIS, if that server allows processing ASP.NET pages and an
attacker succeeds in uploading a specially crafted
ASP.NET page to that server and then executes the page, as could be the
case in a Web hosting scenario. This vulnerability could also be used by
Windows .NET applications to bypass Code Access Security (CAS) restrictions.

Affected Software

Windows XP Service Pack 3
Windows XP Professional x64 Edition Service Pack 2
Windows Server 2003
Windows Server 2003 Service Pack 2
Windows Server 2003 x64 Edition Service Pack 2
Windows Server 2003 with SP2 for Itanium-based Systems
Windows Vista Service Pack 1
Windows Vista Service Pack 2
Windows Vista x64 Edition Service Pack 1
Windows Vista x64 Edition Service Pack 2
Windows Server 2008 for 32-bit Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for Itanium-based Systems
Windows Server 2008 for Itanium-based Systems Service Pack 2
Windows 7 for 32-bit Systems
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for Itanium-based Systems
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1

Vulnerability Information

.NET Framework Array Offset Vulnerability - CVE-2011-0664

A remote code execution vulnerability exists in the Microsoft .NET
Framework that can allow a specially crafted Microsoft .NET application
to access memory in an unsafe manner. An attacker who successfully
exploited this vulnerability could run arbitrary code in the security
context of the logged-on user. An attacker could then install programs;
view, change, or delete data; or create new accounts with full user
rights. Users whose accounts are configured to have fewer user rights on
the system could be less impacted than users who operate with
administrative user rights.


======================================================================

          =========================================================
          Les serveurs de réfé©rence du CERT-Renater
          http://www.urec.fr/securite
          http://www.cru.fr/securite
          http://www.renater.fr
          =========================================================
          + CERT-RENATER          | tel : 01-53-94-20-44          +
          + 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
          + 75013 Paris           | email: certsvp@renater.fr     +
          =========================================================

[An attachment of type application/pkcs7-signature was included here]