Lucene search

K
archlinuxArchLinuxASA-202103-23
HistoryMar 25, 2021 - 12:00 a.m.

[ASA-202103-23] dotnet-sdk-3.1: arbitrary code execution

2021-03-2500:00:00
security.archlinux.org
190
dotnet-sdk-3.1
vulnerability
arbitrary code execution
buffer overrun
cve-2021-26701
text encoding
.net 5.0
.net core 3.1

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.081

Percentile

94.3%

Arch Linux Security Advisory ASA-202103-23

Severity: High
Date : 2021-03-25
CVE-ID : CVE-2021-26701
Package : dotnet-sdk-3.1
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1701

Summary

The package dotnet-sdk-3.1 before version 3.1.13.sdk113-1 is vulnerable
to arbitrary code execution.

Resolution

Upgrade to 3.1.13.sdk113-1.

pacman -Syu “dotnet-sdk-3.1>=3.1.13.sdk113-1”

The problem has been fixed upstream in version 3.1.13.sdk113.

Workaround

None.

Description

A remote code execution vulnerability exists in .NET 5.0 before Runtime
5.0.4 and SDK 5.0.104 as well as .NET Core 3.1 before Runtime 3.1.13
and SDK 3.1.113 due to how text encoding is performed in the
System.Text.Encodings.Web package, caused by a buffer overrun.

Impact

An attacker can execute arbitrary code by abusing the text encoding.

References

https://msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701
https://github.com/dotnet/announcements/issues/178
https://security.archlinux.org/CVE-2021-26701

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanydotnet-sdk-3.1< 3.1.13.sdk113-1UNKNOWN

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.081

Percentile

94.3%