Check Point Reference: | CPAI-2012-072 |
Date Published: | 19 Mar 2012 |
Severity: | Medium |
Last Updated: | Monday 25 November, 2024 |
Source: | CVE-2007-0041 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Microsoft .NET Framework 1.0 Microsoft .NET Framework 1.1 Microsoft .NET Framework 2.0 |
Vulnerability Description | A memory corruption vulnerability has been reported in Microsoft .NET Framework. |
Vulnerability Details | The vulnerability is due to an error in the Common Language Infrastructure (CLI) Loader which does not properly parse certain crafted data. A remote attacker can exploit this vulnerability by persuading a target user to open a specially crafted CLI file. Successful attack could cause Internet Explorer to terminate abnormally, resulting in a denial of service condition. |
This protection will detect and block malformed CLI files.
In order for the protection to be activated, update your product to the latest update. For information on how to update , go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: Content Protection Violation
Attack Information: Microsoft .NET Framework CLI Loader memory corruption