Check Point Advisories

Microsoft .NET Framework Remote Code Execution (MS14-057; CVE-2014-4121)

Check Point Reference: CPAI-2014-1887
Date Published: 14 Oct 2014
Severity: Critical
Last Updated: Tuesday 14 October, 2014
Source: Microsoft Security Bulletin MS14-057
Industry Reference:CVE-2014-4121
Protection Provided by:

Security Gateway
R77

  • R76
  • R75
  • R71
  • R70

  • Who is Vulnerable? Microsoft .NET Framework 2.0 Service Pack 2
    Microsoft .NET Framework 3.5
    Microsoft .NET Framework 3.5.1
    Microsoft .NET Framework 4
    Microsoft .NET Framework 4.5/4.5.1/4.5.2
    Vulnerability Description A remote code execution vulnerability has been reported in the Microsoft .NET Framework. The vulnerability is due to the way .NET framework parses internationalized resource identifiers. A remote attacker could exploit this vulnerability by sending specially crafted data to the target server that uses .NET framework.
    Update/Patch AvaliableApply patches from: MS14-057

    Protection Overview

    Security Gateway R77 / R76 / R75 / R71 / R70

    1. In the IPS tab, click Protections and find the Microsoft .NET Framework Remote Code Execution (MS14-057: CVE-2014-4121) protection using the Search tool and Edit the protection's settings.
    2. Install policy on all modules.

    SmartView Tracker will log the following entries:

    Attack Name: Content Protection Violation.
    Attack Information: Microsoft .NET Framework Remote Code Execution (MS14-057: CVE-2014-4121)

    ×
      Feedback
    This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
    OK