Lucene search

K
zdiVitaliy ToropovZDI-13-004
HistoryFeb 01, 2013 - 12:00 a.m.

Microsoft .NET Framework System.DirectoryServices.Protocols Remote Code Execution Vulnerability

2013-02-0100:00:00
Vitaliy Toropov
www.zerodayinitiative.com
15

0.889 High

EPSS

Percentile

98.7%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft .NET Framework. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the System.DirectoryServices.Protocols.SortRequestControl.GetValue() method inside the .NET Framework. The function allocates an array based on the value of the parameter this.keys.Length and then uses a loop terminated by the same parameter to fill the array with data. If another thread changes the value of this.keys.Length between the array creation and loop this can result in a heap buffer overflow that can lead to remote code execution under the context of the current program.