Microsoft .NET Framework 2.0 SP2, 3.5, and 3.5.1 omits the ASLR protection mechanism, which allows remote attackers to obtain potentially sensitive information about memory addresses by leveraging the predictability of an executable image's location, aka ".NET ASLR Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:09
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/60969 - | |
References | () http://www.securityfocus.com/bid/70312 - | |
References | () http://www.securitytracker.com/id/1031021 - | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057 - |
Information
Published : 2014-10-15 10:55
Updated : 2024-11-21 02:09
NVD link : CVE-2014-4122
Mitre link : CVE-2014-4122
CVE.ORG link : CVE-2014-4122
JSON object : View
Products Affected
microsoft
- .net_framework
CWE
CWE-264
Permissions, Privileges, and Access Controls