Files
cve/2011/CVE-2011-1271.md

22 lines
1.4 KiB
Markdown
Raw Permalink Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2011-1271](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1271)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.5%20Gold%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.5%20SP1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=3.5.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brightgreen)
### Description
The JIT compiler in Microsoft .NET Framework 3.5 Gold and SP1, 3.5.1, and 4.0, when IsJITOptimizerDisabled is false, does not properly handle expressions related to null strings, which allows context-dependent attackers to bypass intended access restrictions, and consequently execute arbitrary code, in opportunistic circumstances by leveraging a crafted application, as demonstrated by (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework JIT Optimization Vulnerability."
### POC
#### Reference
- http://stackoverflow.com/questions/2135509/bug-only-occurring-when-compile-optimization-enabled/
#### Github
No PoCs found on GitHub currently.