{"vuid":"VU#375859","idnumber":"375859","name":"Microsoft ASP.NET contains buffer overflow","keywords":["Microsoft","ASP.NET","buffer overflow","DoS","denial of service","processing of cookies","StateServer mode","MS02-026","Q322289"],"overview":"Microsoft ASP.NET contains buffer overflow in routine that handles the processing of cookies in StateServer mode.","clean_desc":"ASP.NET is a programming framework provided by Microsoft. For more details about this framework, please see the official web page. A remotely exploitable buffer overflow exists in one of the routines used to process cookies in StateServer mode. For more details, please see Microsoft Security Bulletin MS02-026.","impact":"Microsoft states the impact as follows: \"An attacker who was able to successfully exploit this vulnerability could cause the application running on the web server to restart. In addition, while Microsoft has not been able to demonstrate it, there is the possibility that an attacker could exploit this vulnerability to cause code to run on the web server. The code could run in the security context of the ASP.NET worker process, which uses an unprivileged account by default\".","resolution":"Apply the patch.","workarounds":"","sysaffected":"","thanks":"The CERT/CC thanks Microsoft for the information contained in their security bulletin.","author":"This document was written by Ian A Finlay.","public":["http://www.microsoft.com/technet/security/bulletin/MS02-026.asp","http://www.securityfocus.com/bid/4958","http://www.asp.net"],"cveids":["CVE-2002-0369"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-06-07T13:40:56Z","publicdate":"2002-06-06T00:00:00Z","datefirstpublished":"2002-07-09T14:56:38Z","dateupdated":"2002-08-16T15:08:46Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"10","cam_internetinfrastructure":"17","cam_population":"8","cam_impact":"15","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"28.35","cam_scorecurrentwidelyknown":"31.725","cam_scorecurrentwidelyknownexploited":"38.475","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":28.35,"vulnote":null}