CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
55.0%
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET 6.0, .NET 5.0 and .NET Core 3.1 where a malicious client can cause a Denial of Service via excess memory allocations through HttpClient.
If you’re using .NET Core 6.0, you should download and install Runtime 6.0.5 or SDK 6.0.105 (for Visual Studio 2022 v17.0) or SDK 6.0.203 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
If you’re using .NET 5.0, you should download and install Runtime 5.0.17 or SDK 5.0.214 (for Visual Studio 2019 v16.9) or SDK 5.0.408 (for Visual Studio 2011 v16.11) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
If you’re using .NET Core 3.1, you should download and install Runtime 3.1.25 or SDK 3.1.419 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
.NET 6.0, .NET 5.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type “Check for updates” in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/221
An Issue for this can be found at https://github.com/dotnet/runtime/issues/69149
MSRC details for this can be found at https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2022-23267
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | aspnetcore.app.runtime.win-x86 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-x86:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.win-x64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-x64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.win-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.win-arm | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-arm:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.osx-x64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.osx-x64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.osx-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.osx-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-x64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-x64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-musl-x64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-musl-x64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-musl-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-musl-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-musl-arm | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-musl-arm:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-485p-mrj5-8w2v
github.com/dotnet/announcements/issues/221
github.com/dotnet/runtime/security/advisories/GHSA-485p-mrj5-8w2v
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
lists.fedoraproject.org/archives/list/[email protected]/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
lists.fedoraproject.org/archives/list/[email protected]/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
lists.fedoraproject.org/archives/list/[email protected]/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
nvd.nist.gov/vuln/detail/CVE-2022-23267
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
55.0%