Microsoft .NET Framework SDK ildasm Buffer Overflow

ERCOLINO

Membro dello Staff
Amministratore
Registrato
3 Marzo 2003
Messaggi
246.739
Località
Torino
Secunia Advisory: SA19406 Print Advisory
Release Date: 2006-03-27

Critical:Moderately critical
Impact: DoS
System access
Where: From remote
Solution Status: Unpatched

Software: Microsoft .NET Framework 1.x

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

Description:
A vulnerability has been discovered in Microsoft .NET Framework SDK, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a user's system.

The vulnerability is caused due to a boundary error within ildasm when disassembling a DLL file. This can be exploited to cause a heap-based buffer overflow when a specially crafted DLL is disassembled.

The vulnerability has been confirmed in version 1.1 with SP1. Other versions may also be affected.

NOTE: It has also been reported that assembling a (.il) file containing a call to a function with an overly long method name using "ilasm" will cause a buffer overflow.

Solution:
Do not use ildasm to disassemble untrusted DLL files.



Bollettino secunia
 
Indietro
Alto Basso