Blocks/Common/Src/Configuration/Manageability/Adm/AdmContentBuilder.cs in Microsoft patterns & practices Enterprise Library (aka EntLib) allows context-dependent attackers to cause a denial of service (CPU consumption) via an input string composed of many \ (backslash) characters followed by a " (double quote), related to a certain regular expression, aka a "ReDoS" vulnerability.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.checkmarx.com/Upload/Documents/PDF/Checkmarx_OWASP_IL_2009_ReDoS.pdf - Exploit | |
References | () http://www.securityfocus.com/archive/1/506419/100/0/threaded - |
Information
Published : 2009-09-21 19:30
Updated : 2024-11-21 01:06
NVD link : CVE-2009-3275
Mitre link : CVE-2009-3275
CVE.ORG link : CVE-2009-3275
JSON object : View
Products Affected
microsoft
- enterprise_library
CWE
CWE-134
Use of Externally-Controlled Format String