First published: Wed Nov 11 2015(Updated: )
Microsoft .NET Framework 2.0 SP2, 3.5, and 3.5.1 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka ".NET ASLR Bypass."
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft .NET Framework | =2.0-sp2 | |
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework | =3.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6115 has a high severity rating due to its potential to allow remote attackers to bypass ASLR protections in affected .NET Framework versions.
CVE-2015-6115 affects Microsoft .NET Framework versions 2.0 SP2, 3.5, and 3.5.1.
To address CVE-2015-6115, it is recommended to apply the latest security updates provided by Microsoft for affected .NET Framework versions.
CVE-2015-6115 enables remote attackers to exploit a vulnerability that bypasses the Address Space Layout Randomization (ASLR) protection mechanism.
There is no official workaround for CVE-2015-6115; the only mitigation is to apply the relevant security updates from Microsoft.