CVE-2009-3275

Blocks/Common/Src/Configuration/Manageability/Adm/AdmContentBuilder.cs in Microsoft patterns & practices Enterprise Library (aka EntLib) allows context-dependent attackers to cause a denial of service (CPU consumption) via an input string composed of many \ (backslash) characters followed by a " (double quote), related to a certain regular expression, aka a "ReDoS" vulnerability.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:enterprise_library:3.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:enterprise_library:4.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:enterprise_library:4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 01:06

Type Values Removed Values Added
References () http://www.checkmarx.com/Upload/Documents/PDF/Checkmarx_OWASP_IL_2009_ReDoS.pdf - Exploit () http://www.checkmarx.com/Upload/Documents/PDF/Checkmarx_OWASP_IL_2009_ReDoS.pdf - Exploit
References () http://www.securityfocus.com/archive/1/506419/100/0/threaded - () http://www.securityfocus.com/archive/1/506419/100/0/threaded -

Information

Published : 2009-09-21 19:30

Updated : 2024-11-21 01:06


NVD link : CVE-2009-3275

Mitre link : CVE-2009-3275

CVE.ORG link : CVE-2009-3275


JSON object : View

Products Affected

microsoft

  • enterprise_library
CWE
CWE-134

Use of Externally-Controlled Format String