Vulnerability CVE-2008-5100


Published: 2008-11-17   Modified: 2012-02-13

Description:
The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attackers to bypass Global Assembly Cache (GAC) and Code Access Security (CAS) protection mechanisms, aka MSRC ticket MSRC8566gs.

See advisories in our WLB2 database:
Topic
Author
Date
High
New Whitepaper - .NET Framework Rootkits: Backdoors inside your Framework
Erez Metula
20.11.2008

Type:

CWE-310

(Cryptographic Issues)

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Microsoft -> .net framework 

 References:
http://securityreason.com/securityalert/4605
http://www.applicationsecurity.co.il/.NET-Framework-Rootkits.aspx
http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=ycIS1bewMBI%3d&tabid=161&mid=555
http://www.securityfocus.com/archive/1/498311/100/0/threaded

Copyright 2022, cxsecurity.com

 

Back to Top