CVE-2012-0161
Published May 9, 2012
Last updated 6 years ago
Overview
- Description
- Microsoft .NET Framework 1.0 SP3, 1.1 SP1, 2.0 SP2, 3.0 SP2, 3.5 SP1, 3.5.1, and 4 does not properly handle an unspecified exception during use of partially trusted assemblies to serialize input data, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP) or (2) a crafted .NET Framework application, aka ".NET Framework Serialization Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.0:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4B659D4-6EDD-4A31-A7CC-70B12EBEB4D8" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0BF6AE15-EAC3-4100-A742-211026C79CCC" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42A6DF09-B8E1-414D-97E7-453566055279" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D400E856-2B2E-4CEA-8CA5-309FDF371CEA" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C610747-93E5-4014-8ED2-47F333174832" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8EDC4407-7E92-4E60-82F0-0C87D1860D3A" }, { "criteria": "cpe:2.3:a:microsoft:.net_framework:4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "792B417F-96A0-4E9D-9E79-5D7F982E2225" } ], "operator": "OR" } ] } ]