CVE-2023-36799
.NET Core and Visual Studio Denial of Service Vulnerability
Severity Score
6.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
.NET Core and Visual Studio Denial of Service Vulnerability
Vulnerabilidad de DenegaciĆ³n de Servicio en .NET Core y Visual Studio
A vulnerability was found in dotnet. This issue can lead to a denial of service when processing X.509 certificates.
USN-6438-1 fixed vulnerabilities in .Net. It was discovered that the fix for [CVE-2023-36799] was incomplete. This update fixes the problem. Kevin Jones discovered that .NET did not properly process certain X.509 certificates. An attacker could possibly use this issue to cause a denial of service. It was discovered that the .NET Kestrel web server did not properly handle HTTP/2 requests. A remote attacker could possibly use this issue to cause a denial of service.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-06-27 CVE Reserved
- 2023-09-12 CVE Published
- 2025-01-01 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799 | 2024-05-29 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/security/cve/CVE-2023-36799 | 2023-11-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2237317 | 2023-11-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microsoft Search vendor "Microsoft" | .net Search vendor "Microsoft" for product ".net" | 6.0.0 Search vendor "Microsoft" for product ".net" and version "6.0.0" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | .net Search vendor "Microsoft" for product ".net" | 7.0.0 Search vendor "Microsoft" for product ".net" and version "7.0.0" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Visual Studio 2022 Search vendor "Microsoft" for product "Visual Studio 2022" | >= 17.2 < 17.2.19 Search vendor "Microsoft" for product "Visual Studio 2022" and version " >= 17.2 < 17.2.19" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Visual Studio 2022 Search vendor "Microsoft" for product "Visual Studio 2022" | >= 17.4 < 17.4.11 Search vendor "Microsoft" for product "Visual Studio 2022" and version " >= 17.4 < 17.4.11" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Visual Studio 2022 Search vendor "Microsoft" for product "Visual Studio 2022" | >= 17.6 < 17.6.7 Search vendor "Microsoft" for product "Visual Studio 2022" and version " >= 17.6 < 17.6.7" | - |
Affected
| ||||||
Microsoft Search vendor "Microsoft" | Visual Studio 2022 Search vendor "Microsoft" for product "Visual Studio 2022" | >= 17.7 < 17.7.4 Search vendor "Microsoft" for product "Visual Studio 2022" and version " >= 17.7 < 17.7.4" | - |
Affected
|