First published: Wed May 15 2013(Updated: )
The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5 does not properly check signatures, which allows remote attackers to make undetected changes to signed XML documents via unspecified vectors that preserve signature validity, aka "XML Digital Signature Spoofing Vulnerability."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft .NET Framework | =2.0-sp2 | |
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework | =3.5.1 | |
Microsoft .NET Framework | =4.0 | |
Microsoft .NET Framework | =4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1336 has a severity rating of important, indicating a significant risk that could lead to exploitation.
To fix CVE-2013-1336, you should apply the latest security updates provided by Microsoft for the affected .NET Framework versions.
CVE-2013-1336 affects Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.0, and 4.5.
CVE-2013-1336 enables remote attackers to undetected changes to signed XML documents while preserving signature validity.
Yes, CVE-2013-1336 involves improper signature verification in the Common Language Runtime of the .NET Framework.