CVE-2014-4122

Microsoft .NET Framework 2.0 SP2, 3.5, and 3.5.1 omits the ASLR protection mechanism, which allows remote attackers to obtain potentially sensitive information about memory addresses by leveraging the predictability of an executable image's location, aka ".NET ASLR Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*

History

21 Nov 2024, 02:09

Type Values Removed Values Added
References () http://secunia.com/advisories/60969 - () http://secunia.com/advisories/60969 -
References () http://www.securityfocus.com/bid/70312 - () http://www.securityfocus.com/bid/70312 -
References () http://www.securitytracker.com/id/1031021 - () http://www.securitytracker.com/id/1031021 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-057 -

Information

Published : 2014-10-15 10:55

Updated : 2024-11-21 02:09


NVD link : CVE-2014-4122

Mitre link : CVE-2014-4122

CVE.ORG link : CVE-2014-4122


JSON object : View

Products Affected

microsoft

  • .net_framework
CWE
CWE-264

Permissions, Privileges, and Access Controls