Lucene search

K
cve[email protected]CVE-2023-36042
HistoryNov 14, 2023 - 6:15 p.m.

CVE-2023-36042

2023-11-1418:15:34
CWE-400
CWE-122
web.nvd.nist.gov
105
visual studio
dos
vulnerability
cve-2023-36042
nvd

CVSS3

6.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

AI Score

6.1

Confidence

High

EPSS

0

Percentile

9.7%

Visual Studio Denial of Service Vulnerability

Affected configurations

Vulners
NVD
Node
microsoftvisual_studioMatch17.6
Node
microsoftvisual_studioMatch17.7
Node
microsoft.netMatch3.5
OR
microsoft.netMatch4.8.1
VendorProductVersionCPE
microsoftmicrosoft_visual_studio_2022_17.6*cpe:2.3:a:microsoft:microsoft_visual_studio_2022_17.6:*:*:*:*:*:*:*:*
microsoftmicrosoft_visual_studio_2022_17.7*cpe:2.3:a:microsoft:microsoft_visual_studio_2022_17.7:*:*:*:*:*:*:*:*
microsoft.net_framework4.8.1cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.6",
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "17.6.0",
        "lessThan": "17.6.10",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft Visual Studio 2022 version 17.7",
    "cpes": [
      "cpe:2.3:a:microsoft:visual_studio:2022:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Unknown"
    ],
    "versions": [
      {
        "version": "17.7.0",
        "lessThan": "17.7.7",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  },
  {
    "vendor": "Microsoft",
    "product": "Microsoft .NET Framework 3.5 AND 4.8.1",
    "cpes": [
      "cpe:2.3:a:microsoft:.net:4.8.1:*:*:*:*:*:*:*"
    ],
    "platforms": [
      "Windows Server 2022",
      "Windows Server 2022 (Server Core installation)",
      "Windows 11 version 21H2 for x64-based Systems",
      "Windows 11 version 21H2 for ARM64-based Systems",
      "Windows 10 Version 21H2 for 32-bit Systems",
      "Windows 10 Version 21H2 for ARM64-based Systems",
      "Windows 10 Version 21H2 for x64-based Systems",
      "Windows 11 Version 22H2 for ARM64-based Systems",
      "Windows 11 Version 22H2 for x64-based Systems",
      "Windows 10 Version 22H2 for x64-based Systems",
      "Windows 10 Version 22H2 for ARM64-based Systems",
      "Windows 10 Version 22H2 for 32-bit Systems",
      "Windows 11 Version 23H2 for ARM64-based Systems",
      "Windows 11 Version 23H2 for x64-based Systems",
      "Windows Server 2022, 23H2 Edition (Server Core installation)"
    ],
    "versions": [
      {
        "version": "4.8.1",
        "lessThan": "4.8.09214.01",
        "versionType": "custom",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

AI Score

6.1

Confidence

High

EPSS

0

Percentile

9.7%