Описание
Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.
Ссылки
- ExploitPatchVendor Advisory
- ExploitPatch
- Exploit
- ExploitPatchVendor Advisory
- ExploitPatch
- ExploitPatchVendor Advisory
- ExploitPatch
- Exploit
- ExploitPatchVendor Advisory
- ExploitPatch
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:microsoft:.net_framework:1.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:1.0:sp1:sdk:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:1.0:sp2:sdk:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:1.1:sp1:sdk:*:*:*:*:*
EPSS
Процентиль: 95%
0.1696
Средний
4 Medium
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
почти 4 года назад
Buffer overflow in calloc.c in the Microsoft Windows XP SP2 ntdll.dll system library, when used by the ILDASM disassembler in the Microsoft .NET 1.0 and 1.1 SDK, might allow user-assisted attackers to execute arbitrary code via a crafted .dll file with a large static method.
EPSS
Процентиль: 95%
0.1696
Средний
4 Medium
CVSS2
Дефекты
NVD-CWE-Other