Forum Thread: Microsoft .NET Framework JIT Compiler Vulnerability

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Programs

This thread has been marked as locked.
newpost Microsoft .NET Framework JIT Compiler Vulnerability
Member 2nd Nov, 2010 22:35
Ranking: 2
Posts: 34
User Since: 7th Aug, 2010
System Score: N/A
Location: DE
Last edited on 2nd Nov, 2010 22:36

Hello,

I hope that someone who knows how to deactivate the message of this Vulnerability in PSI tells me how to deactivate it. As I see there is only a "ignore this program" button but I don't want to ignore the program but only this one Vulnerability message as I don't have either x64 nor the Itanium architectures so this is a false positive which I get after every scan for new even if it was gone for a while recently.

As I see you need a "ignore only this vulnerability" and not the program button. I hope you implement it somewhen as it is going on my nerves. I get some other vulnerabilitys as false positives each time new and this button is really missing in PSI. I am just wondering when this button will be added. Nobody else missing it?!

Maurice Joyce RE: Microsoft .NET Framework JIT Compiler Vulnerability
Handling Contributor 2nd Nov, 2010 22:50
Score: 12325
Posts: 9,575
User Since: 4th Jan 2009
System Score: N/A
Location: UK
What is the path to the alledged false positive?

FINDING A FILE PATH

ALL PSI VERSIONS EXCEPT VERSION 2 (BETA)


To locate the exact file that the Secunia PSI has detected, use or switch to the ADVANCED interface, then :

1 Click on the + sign of the programme to "expand' it.
2 Click on Technical Details in the Toolbox to see the installation path of the detected file. (Copy (CTRL+C) & paste (CTRL+V) the Installation Path of the file back to the Forum.

PSI VERSION 2 (BETA)

From the DASHBOARD page click on SCAN RESULTS.

1. This will list all your programmes with a + to the left of each one.
2. Click the + sign next to the item that U want help with.
3. This will reveal the path under DETECTED INSTANCES.
4. Highlight it then copy (CTRL+C) then paste (CTRL+V) that path back to the Forum.


Update 7 18:43 02/10/2010




--
Maurice

Microsoft Surface 4 Intel i7 64Bit
Windows 10 Pro version 1809 Build 17763.404
16 GB RAM
IE & Edge Only
Was this reply relevant?
+4
-0
newpost RE: Microsoft .NET Framework JIT Compiler Vulnerability
Member 3rd Nov, 2010 03:37
Score: 2
Posts: 34
User Since: 7th Aug 2010
System Score: N/A
Location: DE
Here you go:

C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\SMSv cHost.exe

As I said I don't want to ignore the program but only to get rid of this problem. If I would ignore the program so other possible vulnerabilities would not been showned.
Was this reply relevant?
+1
-0
Maurice Joyce RE: Microsoft .NET Framework JIT Compiler Vulnerability
Handling Contributor 3rd Nov, 2010 08:42
Score: 12325
Posts: 9,575
User Since: 4th Jan 2009
System Score: N/A
Location: UK
That is not a false positive nor is it unique to 64bit systems.

It is a valid file for .Net Framework 4 32 Bit.

.NET Framework 4 is an optional MS download & it is highly unlikely it will be required for a long time by home users. If it is required the programme requiring it will either include it in the install or a "pop up" notice will appear informing U of the fact (similar to Flash & JAVA).

On the basis I would completely uninstall .NET 4 (there should be two entries in Control Pane>add/remove).

Complete a full PSI rescan & U will be OK.

If U insist on keeping it I would still uninstall it,reboot,complete a PSI rescan to check all is well before attempting another install via Windows update.

--
Maurice

Microsoft Surface 4 Intel i7 64Bit
Windows 10 Pro version 1809 Build 17763.404
16 GB RAM
IE & Edge Only
Was this reply relevant?
+3
-0
newpost RE: Microsoft .NET Framework JIT Compiler Vulnerability
Member 3rd Nov, 2010 16:26
Score: 2
Posts: 34
User Since: 7th Aug 2010
System Score: N/A
Location: DE
Hi,
you have to see this:
http://secunia.com/advisories/41751/

"The vulnerability only affects Microsoft .NET Framework 4.0 on the x64 and Itanium architectures."

So it is a false positive and there is no button to ignore this entry in PSI. There is only a button to ignore the whole program.

I don't see that I should do so much reinstallation and rescanning work. Secunia should put a ignore button for this messages and not only for ignoring the whole program. It would be even better if they solved the problem as I don't have either x64 nor Itanium architectures.

It is very sad.
Was this reply relevant?
+2
-0
Maurice Joyce RE: Microsoft .NET Framework JIT Compiler Vulnerability
Handling Contributor 3rd Nov, 2010 16:56
Score: 12325
Posts: 9,575
User Since: 4th Jan 2009
System Score: N/A
Location: UK
I would leave this thread open to allow a Secunia Official to respond.

I would still uninstall it - pure bloatware until required in the distant future but I fully understand your viewpoint in getting to the truth of your alleged vulnerability.

--
Maurice

Microsoft Surface 4 Intel i7 64Bit
Windows 10 Pro version 1809 Build 17763.404
16 GB RAM
IE & Edge Only
Was this reply relevant?
+3
-0

newpost

RE: Microsoft .NET Framework JIT Compiler Vulnerability
[+]
This reply has been minimised due to a negative Relevancy Score.
Leendert Kip RE: Microsoft .NET Framework JIT Compiler Vulnerability
Contributor 7th Nov, 2010 22:24
Score: 137
Posts: 611
User Since: 22nd Jan 2009
System Score: N/A
Location: NL
on 7th Nov, 2010 18:38, newpost wrote:
Is anybody from the secunia staff reading here? It don't seem to. Unfortunately. Regrettably.

You can be sure that Secunia staff monitors the Forum on a dayly basis. That there wasn't any response yet migh be caused by the fact that Maurice Joyce was trying to help you out. If I was you I should follow his advice to solve the problem. You can really rely on his expertise.



--
PC: PWA Computers
Intel Core I3 2100 3.1Ghz
Kingston DDR3 ValueRam 4GB 1333
Kingston SSD SV300S 240GB
Windows 7 Home Premium 64bits SP1
Secunia PSI 3.0.0.11005
Internet Explorer 11
Mozilla Firefox 59.0.2NL
Google Chrome 66.0.3359.117

Laptop: MSI GT780DX
Intel Core I5-2450
DDR3 RAM 6GB
Windows 7 Home Premium 64bits SP1
Secunia PSI 3.0.0.11005
Internet Explorer 11
Mozilla Firefox 59.0.2NL
Was this reply relevant?
+1
-0
This user no longer exists RE: Microsoft .NET Framework JIT Compiler Vulnerability
Secunia Official 8th Nov, 2010 11:24
Hi,

Microsoft .NET products are not handled by our rules but directly by Microsoft Update it self.

Have you tried running Microsoft Update manually and installing all updates shown?
Remember to restart the computer and run af full scan with Secunia PSI after this procedure.

Hope This Helps

This thread has been marked as locked.