ASP.NET in Microsoft .NET Framework 2.0 SP1 and SP2 and 3.5 Gold and SP1, when ASP 2.0 is used in integrated mode on IIS 7.0, does not properly manage request scheduling, which allows remote attackers to cause a denial of service (daemon outage) via a series of crafted HTTP requests, aka "Remote Unauthenticated Denial of Service in ASP.NET Vulnerability."
References
Link | Resource |
---|---|
http://secunia.com/advisories/36127 | Third Party Advisory |
http://www.securityfocus.com/bid/35985 | Patch Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2009/2231 | Permissions Required Third Party Advisory |
http://www.securitytracker.com/id?1022715 | Third Party Advisory VDB Entry |
http://osvdb.org/56905 | Broken Link |
http://blogs.technet.com/srd/archive/2009/08/11/ms09-035-asp-net-denial-of-service-vulnerability.aspx | Vendor Advisory |
http://www.us-cert.gov/cas/techalerts/TA09-223A.html | Third Party Advisory US Government Resource |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6393 | Third Party Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-036 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-08-12 10:30
Updated : 2018-10-12 14:51
NVD link : CVE-2009-1536
Mitre link : CVE-2009-1536
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
microsoft
- windows_server_2008
- windows_vista
- .net_framework