CVE-2009-2497
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
14/10/2009
Last modified:
09/04/2025
Description
The Common Language Runtime (CLR) in Microsoft .NET Framework 2.0, 2.0 SP1, 2.0 SP2, 3.5, and 3.5 SP1, and Silverlight 2, does not properly handle interfaces, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (XBAP), (2) a crafted Silverlight application, (3) a crafted ASP.NET application, or (4) a crafted .NET Framework application, aka "Microsoft Silverlight and Microsoft .NET Framework CLR Vulnerability."
Impact
Base Score 2.0
9.30
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:.net_framework:2.0:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* | ||
| cpe:2.3:o:microsoft:windows_server_2008:-:sp2:x86:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:.net_framework:2.0:sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.us-cert.gov/cas/techalerts/TA09-286A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6510
- http://www.us-cert.gov/cas/techalerts/TA09-286A.html
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-061
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6510



