Brennan Conroy discovered that the .NET Kestrel web server did not properly handle closing HTTP/3 streams under certain circumstances. An attacker could possibly use this issue to achieve remote code execution. This vulnerability only impacted .NET8. (CVE-2024-38229)
It was discovered that .NET components designed to process malicious input were susceptible to hash flooding attacks. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43483)
It was discovered that the .NET System.IO.Packaging namespace did not properly process SortedList data structures. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43484)
It was discovered that .NET did not properly handle the deserialization of of certain JSON properties. An attacker could possibly use this issue to cause a denial of service, resulting in a crash. (CVE-2024-43485)
{
"binaries": [
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "aspnetcore-runtime-6.0"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "aspnetcore-targeting-pack-6.0"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet-apphost-pack-6.0"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet-host"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet-hostfxr-6.0"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet-runtime-6.0"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet-sdk-6.0"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet-sdk-6.0-source-built-artifacts"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet-targeting-pack-6.0"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet-templates-6.0"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "dotnet6"
},
{
"binary_version": "6.0.135-0ubuntu1~22.04.1",
"binary_name": "netstandard-targeting-pack-2.1"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"id": "CVE-2024-38229",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43483",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43484",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43485",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
}
],
"ecosystem": "Ubuntu:22.04:LTS"
}
{
"binaries": [
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "aspnetcore-runtime-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "aspnetcore-runtime-dbg-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "aspnetcore-targeting-pack-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "dotnet-apphost-pack-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "dotnet-host-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "dotnet-hostfxr-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "dotnet-runtime-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "dotnet-runtime-dbg-8.0"
},
{
"binary_version": "8.0.110-0ubuntu1~22.04.1",
"binary_name": "dotnet-sdk-8.0"
},
{
"binary_version": "8.0.110-0ubuntu1~22.04.1",
"binary_name": "dotnet-sdk-8.0-source-built-artifacts"
},
{
"binary_version": "8.0.110-0ubuntu1~22.04.1",
"binary_name": "dotnet-sdk-dbg-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~22.04.1",
"binary_name": "dotnet-targeting-pack-8.0"
},
{
"binary_version": "8.0.110-0ubuntu1~22.04.1",
"binary_name": "dotnet-templates-8.0"
},
{
"binary_version": "8.0.110-8.0.10-0ubuntu1~22.04.1",
"binary_name": "dotnet8"
},
{
"binary_version": "8.0.110-0ubuntu1~22.04.1",
"binary_name": "netstandard-targeting-pack-2.1-8.0"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"id": "CVE-2024-38229",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43483",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43484",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43485",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
}
],
"ecosystem": "Ubuntu:22.04:LTS"
}
{
"binaries": [
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "aspnetcore-runtime-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "aspnetcore-runtime-dbg-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "aspnetcore-targeting-pack-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "dotnet-apphost-pack-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "dotnet-host-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "dotnet-hostfxr-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "dotnet-runtime-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "dotnet-runtime-dbg-8.0"
},
{
"binary_version": "8.0.110-0ubuntu1~24.04.1",
"binary_name": "dotnet-sdk-8.0"
},
{
"binary_version": "8.0.110-0ubuntu1~24.04.1",
"binary_name": "dotnet-sdk-8.0-source-built-artifacts"
},
{
"binary_version": "8.0.110-0ubuntu1~24.04.1",
"binary_name": "dotnet-sdk-dbg-8.0"
},
{
"binary_version": "8.0.10-0ubuntu1~24.04.1",
"binary_name": "dotnet-targeting-pack-8.0"
},
{
"binary_version": "8.0.110-0ubuntu1~24.04.1",
"binary_name": "dotnet-templates-8.0"
},
{
"binary_version": "8.0.110-8.0.10-0ubuntu1~24.04.1",
"binary_name": "dotnet8"
},
{
"binary_version": "8.0.110-0ubuntu1~24.04.1",
"binary_name": "netstandard-targeting-pack-2.1-8.0"
}
],
"availability": "No subscription required"
}
{
"cves": [
{
"id": "CVE-2024-38229",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43483",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43484",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
},
{
"id": "CVE-2024-43485",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "medium",
"type": "Ubuntu"
}
]
}
],
"ecosystem": "Ubuntu:24.04:LTS"
}