Kaspersky ID:
KLA10603
Detect Date:
11/11/2014
Updated:
09/26/2023

Description

Multiple serious vulnerabilities have been found in Microsoft .NET Framework. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions fain privileges, execute arbitrary code or obtain sensitive information.

Below is a complete list of vulnerabilities

  1. An improper ASLR implementation can be exploited remotely via a specially designed web site or memory addresses prediction;
  2. Unverified data processing can be exploited remotely via vectors related to Internet Explorer;
  3. An improper hash table usage can be exploited remotely via a specially designed request;
  4. Improper TypeFilterLevel checking can be exploited remotely via .NET Remoting manipulations;
  5. Improper IRI parsing can be exploited remotely via a specially designed request;
  6. Unsafe method execution can be exploited remotely via a specially designed .NET application;
  7. Improper TCP connections handling can be exploited remotely via a specially designed HTTP requests;
  8. An improper memory access restrictions can be exploited remotely via vectors related to malformed objects.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2014-4072
    critical
  • CVE-2014-0257
    critical
  • CVE-2014-0253
    critical
  • CVE-2014-0295
    warning
  • CVE-2014-4149
    critical
  • CVE-2014-4122
    warning
  • CVE-2014-4121
    critical
  • CVE-2014-4062
    warning
  • CVE-2014-4073
    critical
  • CVE-2014-1806
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.