.NET Framework Remote Code Execution Vulnerability
Released: Jan 14, 2020
Last updated: Jun 25, 2020
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2020-0605
Executive Summary
A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.
An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of .NET Framework. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
The security update addresses the vulnerability by correcting how .NET Framework checks the source markup of a file.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
Acknowledgements
- Soroush Dalili (@irsdl)
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
- -
Disclaimer
Revisions
Corrected Download and Article links in the Security Updates table. This is an informational change only.
To comprehensively address CVE-2020-0605, Microsoft has released the May 2020 security updates for all versions of Microsoft .NET, with the exception of: Microsoft .NET Framework 3.0 Service Pack 2, Microsoft .NET Framework 3.5, and Microsoft .NET Framework 3.5.1. Microsoft recommends that customers running any other versions of Microsoft .NET Framework should install the May 2020 security updates to be protected from this vulnerability.
In the Security Updates table, corrected the versions of Microsoft .NET that are installed on Windows 10 for 32-bit Systems and Windows 10 for x64-based Systems. This is an informational change only.
Revised the Security Updates table to include PowerShell 7.0 because it addresses this vulnerability in preview versions of PowerShell 7. See https://github.com/PowerShell/Announcements-Internal/issues/19 for more information.
Information published.