Description
The strong name (SN) implementation in Microsoft .NET Framework 2.0.50727 relies on the digital signature Public Key Token embedded in the pathname of a DLL file instead of the digital signature of this file itself, which makes it easier for attackers to bypass Global Assembly Cache (GAC) and Code Access Security (CAS) protection mechanisms, aka MSRC ticket MSRC8566gs.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T10:40:17.176Z
Reserved: 2008-11-17T00:00:00.000Z
Link: CVE-2008-5100
No data.
Status : Modified
Published: 2008-11-17T18:18:47.953
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-5100
No data.
OpenCVE Enrichment
No data.
Weaknesses