Description
Microsoft .NET Framework is prone to a remote privilege-escalation vulnerability. An attacker can exploit this issue to elevate privileges, which may lead to a complete compromise of the affected system.
Technologies Affected
- Avaya Aura Conferencing 6.0 SP1 Standard
- Avaya Aura Conferencing 6.0 Standard
- Avaya Aura Conferencing 6.0.0 Standard
- Avaya Aura Conferencing 7.0 Standard
- Avaya CallPilot 4.0
- Avaya CallPilot 4.0.1
- Avaya CallPilot 5.0
- Avaya CallPilot 5.0.1
- Avaya Communication Server 1000 Telephony Manager 3.0
- Avaya Communication Server 1000 Telephony Manager 3.0.1
- Avaya Communication Server 1000 Telephony Manager 4.0
- Avaya Communication Server 1000 Telephony Manager 4.0.1
- Avaya Meeting Exchange - Client Registration Server 5.0
- Avaya Meeting Exchange - Client Registration Server 5.0.1
- Avaya Meeting Exchange - Client Registration Server 5.2
- Avaya Meeting Exchange - Client Registration Server 5.2.1
- Avaya Meeting Exchange - Client Registration Server 6.0
- Avaya Meeting Exchange - Client Registration Server 6.2
- Avaya Meeting Exchange - Recording Server 5.0
- Avaya Meeting Exchange - Recording Server 5.0.1
- Avaya Meeting Exchange - Recording Server 5.2
- Avaya Meeting Exchange - Recording Server 5.2.1
- Avaya Meeting Exchange - Recording Server 6.0
- Avaya Meeting Exchange - Recording Server 6.2
- Avaya Meeting Exchange - Streaming Server 5.0
- Avaya Meeting Exchange - Streaming Server 5.0.1
- Avaya Meeting Exchange - Streaming Server 5.2
- Avaya Meeting Exchange - Streaming Server 5.2.1
- Avaya Meeting Exchange - Streaming Server 6.0
- Avaya Meeting Exchange - Streaming Server 6.2
- Avaya Meeting Exchange - Web Conferencing Server 5.0
- Avaya Meeting Exchange - Web Conferencing Server 5.0.1
- Avaya Meeting Exchange - Web Conferencing Server 5.2
- Avaya Meeting Exchange - Web Conferencing Server 5.2.1
- Avaya Meeting Exchange - Web Conferencing Server 6.0
- Avaya Meeting Exchange - Web Conferencing Server 6.2
- Avaya Meeting Exchange - Webportal 5.0
- Avaya Meeting Exchange - Webportal 5.0.1
- Avaya Meeting Exchange - Webportal 5.2
- Avaya Meeting Exchange - Webportal 5.2.1
- Avaya Meeting Exchange - Webportal 6.0
- Avaya Meeting Exchange - Webportal 6.2
- Avaya Messaging Application Server 4
- Avaya Messaging Application Server 5
- Avaya Messaging Application Server 5.0
- Avaya Messaging Application Server 5.0.1
- Avaya Messaging Application Server 5.2
- Avaya Messaging Application Server 5.2.1
- Avaya Messaging Application Server MM 1.1
- Avaya Messaging Application Server MM 2.0
- Avaya Messaging Application Server MM 3.0
- Avaya Messaging Application Server MM 3.1
- Microsoft .NET Framework 1.0 SP3
- Microsoft .NET Framework 1.1 SP1
- Microsoft .NET Framework 2.0 SP2
- Microsoft .NET Framework 3.5
- Microsoft .NET Framework 3.5.1
- Microsoft .NET Framework 4.0
- Microsoft .NET Framework 4.5
Recommendations
Block external access at the network boundary, unless external parties require service.
Filter access to the affected computer at the network boundary if global access isnβt needed. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit.
Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity such as unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.
Updates are available. Please see the references or vendor advisory for more information.