ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
References
Link | Resource |
---|---|
http://blogs.technet.com/srd/archive/2009/08/11/ms09-035-asp-net-denial-of-service-vulnerability.aspx | Vendor Advisory |
http://osvdb.org/56905 | Broken Link |
http://secunia.com/advisories/36127 | Third Party Advisory |
http://www.securityfocus.com/bid/35985 | Patch Third Party Advisory VDB Entry |
http://www.securitytracker.com/id?1022715 | Third Party Advisory VDB Entry |
http://www.us-cert.gov/cas/techalerts/TA09-223A.html | Third Party Advisory US Government Resource |
http://www.vupen.com/english/advisories/2009/2231 | Permissions Required Third Party Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-036 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6393 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2009-08-12 17:30
Updated : 2024-02-28 11:21
NVD link : CVE-2009-1536
Mitre link : CVE-2009-1536
CVE.ORG link : CVE-2009-1536
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_vista
- .net_framework
CWE
CWE-20
Improper Input Validation