Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2016.0611.2 Microsoft Security Bulletin MS16-035: Security Update for .NET Framework to Address Security Feature Bypass (3141780) 9 March 2016 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Microsoft .NET Framework Publisher: Microsoft Operating System: Windows Vista Windows Server 2008 Windows 7 Windows Server 2008 R2 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows RT 8.1 Windows 10 Impact/Access: Modify Arbitrary Files -- Remote/Unauthenticated Reduced Security -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-0132 Original Bulletin: https://technet.microsoft.com/en-us/library/security/MS16-035 Revision History: March 9 2016: Update Impacts and access vectors for CVE-2016-0132 March 8 2016: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- Microsoft Security Bulletin MS16-035: Security Update for .NET Framework to Address Security Feature Bypass (3141780) Bulletin Number: MS16-035 Bulletin Title: Security Update for .NET Framework to Address Security Feature Bypass Severity: Important KB Article: 3141780 Version: 1.0 Published Date: March 8, 2016 Executive Summary This security update resolves a vulnerability in the Microsoft .NET Framework. The security feature bypass exists in a .NET Framework component that does not properly validate certain elements of a signed XML document. This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, and Microsoft .NET Framework 4.6.1 on affected releases of Microsoft Windows. Affected Software Microsoft .NET Framework 2.0 Service Pack 2 Microsoft .NET Framework 3.0 Service Pack 2 Microsoft .NET Framework 3.5 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.5.2[1] Microsoft .NET Framework 4.6 [1] Microsoft .NET Framework 4.6.1 Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 Windows 8.1 for 32-bit Systems Windows 8.1 for x64-based Systems Windows Server 2012 Windows Server 2012 R2 Windows RT 8.1 Windows 10 for 32-bit Systems[3] (3140745) Windows 10 for x64-based Systems[3] (3140745) Windows 10 Version 1511 for 32-bit Systems[3] (3140768) Windows 10 Version 1511 for x64-based Systems[3] (3140768) Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 (Server Core installation) Windows Server 2012 R2 (Server Core installation) [1]For information about changes in support for .NET Framework 4.x, see Internet Explorer and .NET Framework 4.x Support Announcements. [2]Windows RT 8.1 updates are available only via Windows Update. [3]Windows 10 updates are cumulative. In addition to containing non-security updates, they also contain all of the security fixes for all of the Windows 10-affected vulnerabilities shipping with the monthly security release. The updates are available via the Microsoft Update Catalog. Vulnerability Information .NET XML Validation Security Feature Bypass - CVE-2016-0132 A security feature bypass vulnerability exists in a .NET Framework component that does not properly validate certain elements of a signed XML document. An attacker who successfully exploited the vulnerability could modify the contents of an XML file without invalidating the signature associated with the file. If a .NET application relies on the signature to be non-malicious, the behavior of the application could become unpredictable. In custom applications, the security impact depends on the specific usage scenario. In a .NET application attack scenario, an attacker could modify the contents of an XML file without invalidating the signature associated with the file. The update addresses the vulnerability by correcting how the .NET Framework validates XML documents. The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list: Vulnerability title CVE number Publicly disclosed Exploited .NET XML Validation Security Feature Bypass CVE-2016-0132 No No - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVt+Ikn6ZAP0PgtI9AQIo2Q/+L1SDcPO4QlVjk8audWtsaKQP6ptW0INv A/k1lC7hFFmjRI0YK4VvPSjPA+lxqYfYr+TRcf70EycHe0BzP6CUBAOHwWavEpWi xdvsoyhyyMBiC/LORQLaD0JXZWh3eShGovE2W1iS/LjC7qi+2QejnNsc13ZpGMxc mWjB+H4eRoP6pDblyoXf1/XH8Qm3i1y2GOVMlDNuaSgR7TAcsny2RGfZZPy1sHo3 fxLTgQ4fJBTfx7Ac4pK59AO+F0eM3p5mgOjjMtMVTHuyeYqf69A6i/XdhU/SjVfg AjrHPFBkCAD+yNkFOcBDIOWAa84CKxBVlqf0kkrktN/nIadwzdiuVwMusdvZ4rnP 0wHUyVeocm69g+nKaJNJhtd1MtoAD1DxIqJnAxMJ1evw21Ll3peHjnyQIykHUP0w mr7nOnZ9QftfzENRFt6vvSgE94xd6G3BKiBamPQW74ujrQK9NevwF34RBIAza7Vz rlSOIKzztbl74Ailvokrun+kCCbndW3qrBIomf6Y0I/t6vGB3rzyEWwDyv4hAh6I FIaKxpVird8WceD4qmPYet23oJCUyJ4cReAcY4JXNwL3Tnx6h8Nefv5IAN2V3rT7 9y+qraOlFRsmPDk0NXHLYByz/4KQyulw6mMCtvAJ61Y0PDGQg+57yK5eNAY2hnA5 ocHp3yrJw0U= =z7qd -----END PGP SIGNATURE-----