CVE-2024-28252

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-28252
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-28252.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-28252
Aliases
Related
Published
2024-03-15T19:15:07Z
Modified
2025-04-10T03:36:35.478505Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

CoreWCF is a port of the service side of Windows Communication Foundation (WCF) to .NET Core. If you have a NetFraming based CoreWCF service, extra system resources could be consumed by connections being left established instead of closing or aborting them. There are two scenarios when this can happen. When a client established a connection to the service and sends no data, the service will wait indefinitely for the client to initiate the NetFraming session handshake. Additionally, once a client has established a session, if the client doesn't send any requests for the period of time configured in the binding ReceiveTimeout, the connection is not properly closed as part of the session being aborted. The bindings affected by this behavior are NetTcpBinding, NetNamedPipeBinding, and UnixDomainSocketBinding. Only NetTcpBinding has the ability to accept non local connections. The currently supported versions of CoreWCF are v1.4.x and v1.5.x. The fix can be found in v1.4.2 and v1.5.2 of the CoreWCF packages. Users are advised to upgrade. There are no workarounds for this issue.

References

Affected packages

Git / github.com/corewcf/corewcf

Affected ranges

Type
GIT
Repo
https://github.com/corewcf/corewcf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

v0.*

v0.4.0

v1.*

v1.1.0
v1.3.0
v1.4.0
v1.4.0-preview1
v1.4.1
v1.5.0
v1.5.0-preview1
v1.5.1