First published: Wed Sep 22 2010(Updated: )
Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft .NET Framework | =1.1-sp1 | |
Microsoft .NET Framework | =2.0-sp1 | |
Microsoft .NET Framework | =2.0-sp2 | |
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework | =3.5-sp1 | |
Microsoft .NET Framework | =3.5.1 | |
Microsoft .NET Framework | =4.0 | |
Microsoft Internet Information Services (IIS) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3332 is considered a high severity vulnerability due to the potential for remote attackers to compromise encrypted data.
To address CVE-2010-3332, it is recommended to upgrade to a supported version of the Microsoft .NET Framework that does not exhibit this vulnerability.
CVE-2010-3332 affects Microsoft .NET Framework versions 1.1 SP1, 2.0 SP1 & SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0.
CVE-2010-3332 allows remote attackers to decrypt and modify View State data, which can lead to unauthorized data manipulation.
Microsoft Internet Information Services itself is not directly affected; however, it can serve content from affected versions of the .NET Framework.