CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
56.3%
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0 and .NET 5.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A Denial of Service vulnerability exists in .NET 6.0 and .NET 5.0 when the Kestrel web server processes certain HTTP/2 and HTTP/3 requests.
To fix the issue, please install the latest version of .NET 6.0 or .NET 5.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
If you’re using .NET Core 6.0, you should download and install Runtime 6.0.2 or SDK 6.0.102 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
If you’re using .NET 5.0, you should download and install Runtime 5.0.14 or SDK 5.0.114 (for Visual Studio 2019 v16.8) or SDK 5.0.405 (for Visual Studio 2011 v16.11) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
.NET 6.0 and .NET 5.0 updates are also available from Microsoft Update. To access this either type “Check for updates” in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | publisher | * | cpe:2.3:a:microsoft:publisher:*:*:*:*:*:*:x86:* |
microsoft | word | * | cpe:2.3:a:microsoft:word:*:*:*:*:*:*:x64:* |
microsoft | aspnetcore.app.runtime.win-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.win-arm | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.win-arm:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.osx-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.osx-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-musl-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-musl-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-musl-arm | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-musl-arm:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-arm64 | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-arm64:*:*:*:*:*:*:*:* |
microsoft | aspnetcore.app.runtime.linux-arm | * | cpe:2.3:a:microsoft:aspnetcore.app.runtime.linux-arm:*:*:*:*:*:*:*:* |
github.com/advisories/GHSA-x459-p2rx-f8ff
github.com/dotnet/announcements/issues/207
github.com/dotnet/aspnetcore/security/advisories/GHSA-x459-p2rx-f8ff
lists.fedoraproject.org/archives/list/[email protected]/message/4HMQOHV7G5TF6OMBN6DNTDOKQQU7KHMM/
lists.fedoraproject.org/archives/list/[email protected]/message/CCTBSBE3PNIMXG6ALX2CQG4ZEH7W3YAT/
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21986
nvd.nist.gov/vuln/detail/CVE-2022-21986
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21986
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:N/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
56.3%