Vulnerabilities in .NET Framework Could Allow Elevation of Privilege (2638420)

Summary
This host is missing a critical security update according to Microsoft Bulletin MS11-100.
Impact
Successful exploitation could allow attacker to cause a denial of service, conduct spoofing attacks or bypass certain security restrictions. Impact Level: System/Application
Solution
Run Windows Update and update the listed hotfixes or download and update mentioned hotfixes in the advisory from the below link, http://technet.microsoft.com/en-us/security/bulletin/ms11-100
Insight
- An error within ASP.NET when hashing form posts and updating a hash table. This can be exploited to cause a hash collision resulting in high CPU consumption via a specially crafted form sent in a HTTP POST request. - Open redirect vulnerability in the Forms Authentication feature in the ASP.NET subsystem allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted return URL. - The Forms Authentication feature in the ASP.NET subsystem allows remote authenticated users to obtain access to arbitrary user accounts via a crafted username. - The Forms Authentication feature in the ASP.NET subsystem when sliding expiry is enabled, does not properly handle cached content, which allows remote attackers to obtain access to arbitrary user accounts via a crafted URL.
Affected
Microsoft .NET Framework 4 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 3.5 Service Pack 1 Microsoft .NET Framework 2.0 Service Pack 2 Microsoft .NET Framework 1.1 Service Pack 1
References