CVE-2008-5100

The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attackers to bypass Global Assembly Cache (GAC) and Code Access Security (CAS) protection mechanisms, aka MSRC ticket MSRC8566gs.
Configurations

Configuration 1 (hide)

cpe:2.3:a:microsoft:.net_framework:2.0.50727:*:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://securityreason.com/securityalert/4605 - () http://securityreason.com/securityalert/4605 -
References () http://www.applicationsecurity.co.il/.NET-Framework-Rootkits.aspx - () http://www.applicationsecurity.co.il/.NET-Framework-Rootkits.aspx -
References () http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=ycIS1bewMBI%3d&tabid=161&mid=555 - Exploit () http://www.applicationsecurity.co.il/LinkClick.aspx?fileticket=ycIS1bewMBI%3d&tabid=161&mid=555 - Exploit
References () http://www.securityfocus.com/archive/1/498311/100/0/threaded - () http://www.securityfocus.com/archive/1/498311/100/0/threaded -

Information

Published : 2008-11-17 18:18

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5100

Mitre link : CVE-2008-5100

CVE.ORG link : CVE-2008-5100


JSON object : View

Products Affected

microsoft

  • .net_framework
CWE
CWE-310

Cryptographic Issues