CVE-2010-3332

CVSS V2 Medium 6.4 CVSS V3 None
Description
Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
Overview
  • CVE ID
  • CVE-2010-3332
  • Assigner
  • secure@microsoft.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2010-09-22T19:00:06
  • Last Modified Date
  • 2020-11-23T19:50:12
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:* 1 OR
cpe:2.3:a:microsoft:.net_framework:2.0:sp1:*:*:*:*:*:* 1 OR
cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:* 1 OR
cpe:2.3:a:microsoft:.net_framework:3.5:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:microsoft:.net_framework:3.5:sp1:*:*:*:*:*:* 1 OR
cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:microsoft:.net_framework:4.0:-:*:*:*:*:*:* 1 OR
cpe:2.3:a:microsoft:internet_information_services:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:P/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 6.4
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 4.9
References
Reference URL Reference Tags
http://twitter.com/thaidn/statuses/24832350146 Broken Link
http://secunia.com/advisories/41409 Third Party Advisory
http://securitytracker.com/id?1024459 Third Party Advisory VDB Entry
http://weblogs.asp.net/scottgu/archive/2010/09/18/important-asp-net-security-vulnerability.aspx Mitigation Third Party Advisory
http://www.troyhunt.com/2010/09/fear-uncertainty-and-and-padding-oracle.html Exploit Third Party Advisory
http://www.ekoparty.org/juliano-rizzo-2010.php Broken Link
http://www.securityfocus.com/bid/43316 Third Party Advisory VDB Entry
http://isc.sans.edu/diary.html?storyid=9568 Third Party Advisory
http://blogs.technet.com/b/srd/archive/2010/09/17/understanding-the-asp-net-vulnerability.aspx Vendor Advisory
http://www.vupen.com/english/advisories/2010/2429 Third Party Advisory
http://www.theinquirer.net/inquirer/news/1732956/security-researchers-destroy-microsoft-aspnet-security Third Party Advisory
http://pentonizer.com/general-programming/aspnet-poet-vulnerability-what-else-can-i-do/ Third Party Advisory
http://www.dotnetnuke.com/Community/Blogs/tabid/825/EntryId/2799/Oracle-Padding-Vulnerability-in-ASP-NET.aspx Third Party Advisory
http://threatpost.com/en_us/blogs/new-crypto-attack-affects-millions-aspnet-apps-091310 Third Party Advisory
http://www.microsoft.com/technet/security/advisory/2416728.mspx Broken Link
http://www.vupen.com/english/advisories/2010/2751 Third Party Advisory
http://www.mono-project.com/Vulnerabilities#ASP.NET_Padding_Oracle Exploit Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/61898 Third Party Advisory VDB Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12365 Third Party Advisory
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-070 Patch Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 16:19:06 Added to TrackCVE