Kaspersky ID:
Detect Date:


Multiple serious vulnerabilities have been found in .NET Framework. Malicious users can exploit these vulnerabilities to cause denial of service, bypass security restrictions or gain privileges.

Below is a complete list of vulnerabilities

  1. Improper memory objects validation can be exploited remotely via a specially designed application or Website to gain privileges or bypass security restrictions;
  2. Improper requests handling at ASP.NET server can be exploited remotely via a specially designed requests to cause denial of service.

Technical details

For vulnerability (1) there are 2 exploitation scenarios. In web attack scenario attacker use web content with specially designed XAML browser application. For success exploitation of this scenario user must be logged in and use browser which is capable for instantinating XBAPs. In .NET app scenario attacker can use malicious .NET application to bypass Code Access Security restrictions. Second scenario requires that affected system allow to run untrusted .NET applications.

Attacker exploiting vulnerability (2) could send small number of specially designed requests to degrade performance of ASP.NET server enough to cause denial of service.

Original advisories

Related products

CVE list

  • CVE-2015-2504
  • CVE-2015-2526

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.