6.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.2%
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A Remote Code Execution vulnerability exists in .NET 6.0, .NET 5.0, and .NET Core 3.1 where a stack buffer overrun occurs in .NET Double Parse routine.
To fix the issue, please install the latest version of .NET 6.0, .NET 5.0, or .NET Core 3.1. If you have installed one or more .NET Core SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET Core SDKs.
github.com/advisories/GHSA-c6w8-7mp3-34j9
github.com/dotnet/announcements/issues/213
github.com/dotnet/runtime/security/advisories/GHSA-c6w8-7mp3-34j9
lists.fedoraproject.org/archives/list/[email protected]/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/
lists.fedoraproject.org/archives/list/[email protected]/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL/
lists.fedoraproject.org/archives/list/[email protected]/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/
lists.fedoraproject.org/archives/list/[email protected]/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V/
lists.fedoraproject.org/archives/list/[email protected]/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK/
lists.fedoraproject.org/archives/list/[email protected]/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512
nvd.nist.gov/vuln/detail/CVE-2022-24512
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24512
6.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.005 Low
EPSS
Percentile
76.2%