.NET Framework Could Allow Execution of Arbitrary Commands

Two buffer overflow vulnerabilities exist in Microsoft .NET Framework, which could allow intruders to execute arbitrary commands. One problem occurs when handling malformed DLL files. The other problem occurs when a program calls a function with an excessively long function name. Microsoft .NET Framework 2.0 is not vulnerable to these attacks so users should upgrade to the newer version

Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.