Lucene search

K

Microsoft .NET Framework Remote Code Execution Vulnerability (KB4040980)

🗓️ 13 Sep 2017 00:00:00Reported by Copyright (C) 2017 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 242 Views

This host is missing an important security update for Microsoft .NET Framework Remote Code Execution Vulnerability (KB4040980)

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Microsoft KB
Security and Quality Rollup for the .NET Framework 2.0 SP2, 4.5.2, and 4.6 for Windows Server 2008 SP2: September 12, 2017
12 Sep 201700:00
mskb
Microsoft KB
Security and Quality Rollup for .NET Framework 3.5 for Windows Server 2012 (KB 4040979)
12 Sep 201707:00
mskb
Microsoft KB
Security Only update for the .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, and 4.7 for Windows Server 2012: September 12, 2017
12 Sep 201700:00
mskb
Microsoft KB
Security Only update for the .NET Framework 2.0 SP2, 4.5.2, and 4.6 for Windows Server 2008 SP2: September 12, 2017
12 Sep 201700:00
mskb
Microsoft KB
Security and Quality Rollup for .NET Framework 3.5 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB 4040981)
12 Sep 201707:00
mskb
Microsoft KB
Security and Quality Rollup for .NET Framework 3.5.1 for Windows 7 SP1 and Windows Server 2008 R2 SP1 (KB 4040980)
12 Sep 201707:00
mskb
Microsoft KB
Security and Quality Rollup for .NET Framework 2.0 SP2 for Windows Server 2008 SP2 (KB 4040978)
12 Sep 201707:00
mskb
Microsoft KB
Security and Quality Rollup for .NET Framework 4.5.2 for Windows Server 2012 (KB 4040975)
12 Sep 201707:00
mskb
Microsoft KB
Description of the Security Only update for the .NET Framework 3.5 for Windows Server 2012: September 12, 2017
12 Sep 201707:00
mskb
Microsoft KB
Description of the Security Only update for the .NET Framework 4.5.2 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2: September 12, 2017
12 Sep 201707:00
mskb
Rows per page
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.811322");
  script_version("2024-07-25T05:05:41+0000");
  script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
  script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
  script_cve_id("CVE-2017-8759");
  script_tag(name:"cvss_base", value:"9.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-07-25 05:05:41 +0000 (Thu, 25 Jul 2024)");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2024-07-24 17:11:20 +0000 (Wed, 24 Jul 2024)");
  script_tag(name:"creation_date", value:"2017-09-13 14:11:50 +0530 (Wed, 13 Sep 2017)");
  script_tag(name:"qod_type", value:"executable_version");
  script_name("Microsoft .NET Framework Remote Code Execution Vulnerability (KB4040980)");

  script_tag(name:"summary", value:"This host is missing an important security
  update according to Microsoft KB4040980");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"A remote code execution vulnerability exists
  when Microsoft .NET Framework processes untrusted input. An attacker who
  successfully exploited this vulnerability in software using the .NET framework
  could take control of an affected system.");

  script_tag(name:"impact", value:"Successful exploitation will allow remote
  attackers to execute code.");

  script_tag(name:"affected", value:"Microsoft .NET Framework 3.5.1.");

  script_tag(name:"solution", value:"The vendor has released updates. Please see the references for more information.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/4040980");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/100742");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2017 Greenbone AG");
  script_family("Windows : Microsoft Bulletins");
  script_dependencies("smb_reg_service_pack.nasl");
  script_mandatory_keys("SMB/WindowsVersion");
  script_require_ports(139, 445);
  exit(0);
}


include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");

if(hotfix_check_sp( win7:2, win7x64:2, win2008r2:2 ) <= 0){
  exit(0);
}

key = "SOFTWARE\Microsoft\ASP.NET\";
if(!registry_key_exists(key:key)){
  exit(0);
}

foreach item (registry_enum_keys(key:key))
{
  dotpath = registry_get_sz(key:key + item, item:"Path");
  if(dotpath && "\Microsoft.NET\Framework" >< dotpath)
  {
    dllVer = fetch_file_version(sysPath:dotpath, file_name:"System.dll");
    if(dllVer)
    {
      ##.NET Framework 3.5.1 for Windows Server 2012: September 12, 2017
      if(version_in_range(version:dllVer, test_version:"2.0.50727.8000", test_version2:"2.0.50727.8769"))
      {
        report = 'File checked:     ' + dotpath + "\system.dll" + '\n' +
                 'File version:     ' + dllVer  + '\n' +
                 'Vulnerable range: 2.0.50727.8000 - 2.0.50727.8769' + '\n' ;
        security_message(data:report);
        exit(0);
      }
    }
  }
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
13 Sep 2017 00:00Current
7.5High risk
Vulners AI Score7.5
CVSS29.3
CVSS37.8
EPSS0.951
242
.json
Report