CVE-2007-0042

Current Description

Interpretation conflict in ASP.NET in Microsoft .NET Framework 1.0, 1.1, and 2.0 for Windows 2000, XP, Server 2003, and Vista allows remote attackers to access configuration files and obtain sensitive information, and possibly bypass security mechanisms that try to constrain the final substring of a string, via %00 characters, related to use of %00 as a string terminator within POSIX functions but a data character within .NET strings, aka "Null Byte Termination Vulnerability."

Basic Data

PublishedJuly 10, 2007
Last ModifiedOctober 30, 2018
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeCWE-200
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score7.8
SeverityHIGH
Exploitability Score10.0
Impact Score6.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • AND
    • OR - Configuration 1
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3OSMicrosoftWindows 2000-*******
      2.3OSMicrosoftWindows 2003 Server-*******
      2.3OSMicrosoftWindows Vista-*******
      2.3OSMicrosoftWindows Xp-*******
    • OR Running on/with:
      Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
      2.3ApplicationMicrosoft.net Framework1.0*******
      2.3ApplicationMicrosoft.net Framework1.1*******
      2.3ApplicationMicrosoft.net Framework2.0*******

Vulnerable Software List

VendorProductVersions
Microsoft .net Framework 1.0, 1.1, 2.0

References

NameSourceURLTags
SSRT071446http://archive.cert.uni-stuttgart.de/bugtraq/2007/07/msg00254.htmlHP
26003http://secunia.com/advisories/26003SECUNIAVendor Advisory
http://security-assessment.com/files/advisories/2007-07-11_Multiple_.NET_Null_Byte_Injection_Vulnerabilities.pdfhttp://security-assessment.com/files/advisories/2007-07-11_Multiple_.NET_Null_Byte_Injection_VulneraMISC
1018356http://www.securitytracker.com/id?1018356SECTRACK
TA07-191Ahttp://www.us-cert.gov/cas/techalerts/TA07-191A.htmlCERTUS Government Resource
ADV-2007-2482http://www.vupen.com/english/advisories/2007/2482VUPEN
MS07-040https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-040MS
oval:org.mitre.oval:def:2070https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2070OVAL