The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check signatures, which allows remote attackers to make undetected changes to signed XML documents via unspecified vectors that preserve signature validity, aka "XML Digital Signature Spoofing Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.us-cert.gov/ncas/alerts/TA13-134A - US Government Resource | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-040 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16559 - |
Information
Published : 2013-05-15 03:36
Updated : 2024-11-21 01:49
NVD link : CVE-2013-1336
Mitre link : CVE-2013-1336
CVE.ORG link : CVE-2013-1336
JSON object : View
Products Affected
microsoft
- .net_framework
CWE
CWE-20
Improper Input Validation