Microsoft .NET Multiple Flaws Let Remote Users Execute Arbitrary Code and Local Users Bypass Security and Gain Elevated Privileges
|
SecurityTracker Alert ID: 1041257 |
SecurityTracker URL: http://securitytracker.com/id/1041257
|
CVE Reference:
CVE-2018-8202, CVE-2018-8260, CVE-2018-8284, CVE-2018-8356
(Links to External Site)
|
Date: Jul 10 2018
|
Impact:
Execution of arbitrary code via network, User access via local system, User access via network
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.7.2 Developer Pack; .NET Core 1.0, 1.1, 2.0; ASP.NET Core 1.0, 1.1, 2.0;
|
Description:
Several vulnerabilities were reported in Microsoft .NET. A remote user can cause arbitrary code to be executed on the target user's system. A local user can obtain elevated privileges on the target system. A local user can bypass security restrictions.
A local user can run a specially crafted application to exploit a flaw in the activation of COM objects and gain elevated privileges [CVE-2018-8202].
A local user can present an expired certificate to bypass certificate validation on the target system [CVE-2018-8356].
A remote user can create a specially crafted file that, when opened by the target user via .NET, will trigger a flaw in the validation of source markup and execute arbitrary code [CVE-2018-8260].
A remote user can create a specially crafted file that, when opened by the target user via .NET, will trigger an input validation flaw and execute arbitrary code [CVE-2018-8284].
Lasse Trolle Borup of Langkjaer Cyber Defence and Soroush Dalili of NCC Group reported some of these vulnerabilities.
|
Impact:
A remote user can create content that, when loaded by the target user, will execute arbitrary code on the target user's system.
A local user can obtain elevated privileges on the target system.
A local user can bypass security controls on the target system.
|
Solution:
The vendor has issued a fix.
The Microsoft advisories are available at:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8202
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8260
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8284
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8356
|
Vendor URL: portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8202 (Links to External Site)
|
Cause:
Access control error, Input validation error
|
Underlying OS: Windows (2008), Windows (2012), Windows (2016), Windows (7), Windows (8), Windows (10)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|