CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
55.0%
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET 6.0, .NET 5.0 and .NET core 3.1 where a malicious client can can cause a denial of service when HTML forms are parsed.
.NET Core 3.1
Package name | Affected version | Patched version |
---|---|---|
Microsoft.AspNetCore.App.Runtime.win-x64 | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.linux-x64 | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.win-x86 | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.osx-x64 | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64 | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.linux-arm64 | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.linux-arm | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.win-arm64 | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.win-arm | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 | >=3.0.0,3.1.24 | 3.1.25 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm | >=3.0.0,3.1.24 | 3.1.25 |
.NET 5.0
Package name | Affected version | Patched version |
---|---|---|
Microsoft.AspNetCore.App.Runtime.win-x64 | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.linux-x64 | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.win-x86 | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.osx-x64 | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64 | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.linux-arm64 | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.linux-arm | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.win-arm64 | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.win-arm | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 | >=5.0.0,5.0.16 | 5.0.17 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm | >=5.0.0,5.0.16 | 5.0.17 |
.NET 6.0
Package name | Affected version | Patched version |
---|---|---|
Microsoft.AspNetCore.App.Runtime.win-x64 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-x64 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.win-x86 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.osx-x64 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-arm64 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-arm | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.win-arm64 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.win-arm | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.osx-arm64 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 | >=6.0.0,6.0.4 | 6.0.5 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm | >=6.0.0,6.0.4 | 6.0.5 |
If you’re using .NET Core 6.0, you should download and install Runtime 6.0.5 or SDK 6.0.105 (for Visual Studio 2022 v17.0) or SDK 6.0.203 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
If you’re using .NET 5.0, you should download and install Runtime 5.0.17 or SDK 5.0.214 (for Visual Studio 2019 v16.9) or SDK 5.0.408 (for Visual Studio 2011 v16.11) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
If you’re using .NET Core 3.1, you should download and install Runtime 3.1.25 or SDK 3.1.419 (for Visual Studio 2019 v16.9 or Visual Studio 2011 16.11 or Visual Studio 2022 17.0 or Visual Studio 2022 17.1 ) from https://dotnet.microsoft.com/download/dotnet-core/3.1.
.NET 6.0, .NET 5.0 and .NET Core 3.1 updates are also available from Microsoft Update. To access this either type “Check for updates” in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Announcement for this issue can be found at https://github.com/dotnet/announcements/issues/222
An Issue for this can be found at https://github.com/dotnet/aspnetcore/issues/41609
MSRC details for this can be found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | aspnetcore.app.runtime.linux-musl-arm | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-musl-arm:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-musl-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-musl-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.win-arm | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-arm:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.win-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-arm | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-arm:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-musl-x64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-musl-x64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.osx-x64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.osx-x64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.win-x86 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-x86:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-x64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-x64:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-fcg8-mg9g-6hc4
github.com/dotnet/aspnetcore/security/advisories/GHSA-fcg8-mg9g-6hc4
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
lists.fedoraproject.org/archives/list/[email protected]/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
lists.fedoraproject.org/archives/list/[email protected]/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
lists.fedoraproject.org/archives/list/[email protected]/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
nvd.nist.gov/vuln/detail/CVE-2022-29145
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29145
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
55.0%