Redgate .NET Reflector before 10.0.7.774 and SmartAssembly before 6.12.5 allow attackers to execute code by decompiling a compiled .NET object (such as a DLL or EXE file) with a specific embedded resource file.
References
Link | Resource |
---|---|
https://documentation.red-gate.com/ref10/release-notes-and-other-versions/net-reflector-10-0-release-notes | Release Notes Vendor Advisory |
https://documentation.red-gate.com/sa6/release-notes-and-other-versions/smartassembly-6-12-release-notes | Release Notes Vendor Advisory |
https://www.nccgroup.trust/us/our-research/technical-advisory-code-execution-by-viewing-resource-files-in-.net-reflector/?research=Technical+advisories | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-07-31T14:00:00
Updated: 2018-08-15T17:57:01
Reserved: 2018-07-24T00:00:00
Link: CVE-2018-14581
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-07-31T14:29:00.807
Modified: 2018-10-05T17:28:16.743
Link: CVE-2018-14581
JSON object: View
Redhat Information
No data.
CWE