7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
54.9%
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0, and .NET CORE 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
Microsoft is aware of a Denial of Service vulnerability, which exists in .NET 6.0, .NET 5.0, and .NET CORE 3.1 when parsing certain types of http form requests.
To fix the issue, please install the latest version of .NET 6.0 or .NET 5.0 or .NET Core 3.1… If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
If you’re using .NET Core 6.0, you should download and install Runtime 6.0.3 or SDK 6.0.201 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
If you’re using .NET 5.0, you should download and install Runtime 5.0.15 or SDK 5.0.406 (for Visual Studio 2019 v16.11) or SDK 5.0.212 (for Visual Studio 2011 v16.9) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
If you’re using .NET Core 3.1, you should download and install Runtime 3.1.23 or SDK 3.1.417 (for Visual Studio 2019 v16.7.26) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
.NET 6.0 and .NET 5.0 updates are also available from Microsoft Update. To access this either type “Check for updates” in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
.NET 6.0 and .NET 5.0 and, .NET Core 3.1 updates are also available from Microsoft Update. To access this either type “Check for updates” in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
github.com/advisories/GHSA-cw98-9j8w-wxv9
github.com/dotnet/announcements/issues/212
github.com/dotnet/aspnetcore/security/advisories/GHSA-cw98-9j8w-wxv9
lists.fedoraproject.org/archives/list/[email protected]/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/
lists.fedoraproject.org/archives/list/[email protected]/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL/
lists.fedoraproject.org/archives/list/[email protected]/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/
lists.fedoraproject.org/archives/list/[email protected]/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V/
lists.fedoraproject.org/archives/list/[email protected]/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK/
lists.fedoraproject.org/archives/list/[email protected]/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24464
nvd.nist.gov/vuln/detail/CVE-2022-24464
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24464
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
0.002 Low
EPSS
Percentile
54.9%