Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Critical Buffer Overflows Plague .NET Framework

Critical Buffer Overflows Plague .NET Framework

Severity: High

10 July, 2007

Summary:

Today, Microsoft released a security bulletin describing three vulnerabilities affecting Microsoft .NET Framework 1.0, 1.1, and 2.0. By tricking one of your users into visiting a maliciously-crafted web page, an attacker could exploit the worst of these vulnerabilities to execute code on that user’s computer, with that user’s privileges. In the worst case, the attacker could gain complete control of a victim’s system. If you’ve installed .NET Framework on computers in your network, you should download, test, and deploy the appropriate patches as soon as possible.

Exposure:

According to Microsoft, the .NET Framework is a managed code programming model for building applications that have visually appealing user experiences, seamless and secure communication, and the ability to model a range of business processes. Windows does not always include the .NET Framework. However, many administrators install it on their machines to support internal web applications and custom programs.

In a bulletin released today as part of their monthly patch update, Microsoft described three vulnerabilities in .NET Framework 1.0, 1.1, and 2.0. The flaws include two buffer overflow vulnerabilities that could allow remote code execution on client systems running .NET Framework, and an information disclosure flaw that affects web servers running ASP.NET.

Critical Buffer Overflows Plague .NET Framework

Severity: High

10 July, 2007

Summary:

Today, Microsoft released a security bulletin describing three vulnerabilities affecting Microsoft .NET Framework 1.0, 1.1, and 2.0. By tricking one of your users into visiting a maliciously-crafted web page, an attacker could exploit the worst of these vulnerabilities to execute code on that user’s computer, with that user’s privileges. In the worst case, the attacker could gain complete control of a victim’s system. If you’ve installed .NET Framework on computers in your network, you should download, test, and deploy the appropriate patches as soon as possible.

Exposure:

According to Microsoft, the .NET Framework is a managed code programming model for building applications that have visually appealing user experiences, seamless and secure communication, and the ability to model a range of business processes. Windows does not always include the .NET Framework. However, many administrators install it on their machines to support internal web applications and custom programs.

In a bulletin released today as part of their monthly patch update, Microsoft described three vulnerabilities in .NET Framework 1.0, 1.1, and 2.0. The flaws include two buffer overflow vulnerabilities that could allow remote code execution on client systems running .NET Framework, and an information disclosure flaw that affects web servers running ASP.NET.

The two buffer overflow flaws pose the most serious risk to small to medium businesses. By enticing one of your users into visiting a malicious web site, an attacker could exploit either of these flaws to execute code on that users computer, with that user’s privileges. If that user had local administrative privileges, the attacker would gain complete control of the victim machine.

Solution Path

Microsoft has released .NET Framework updates that fix these vulnerabilities. If you’ve installed .NET Framework in your network, you should download, test and install the appropriate updates as soon as possible.

For All WatchGuard Users:

These attacks travel as normal-looking HTTP traffic, which you need to allow so your network users can access the World Wide Web. Therefore, the patches above are your best solution.

Status:

Microsoft has released patches correcting these issues.

References:

This alert was researched and written by Corey Nachreiner, CISSP

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 17 December 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...