vulnerability

Microsoft CVE-2018-0764: .NET and .NET Core Denial of Service Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Jan 9, 2018
Added
Jan 14, 2019
Modified
Nov 18, 2021

Description

A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to a .NET (or .NET core) application.
The update addresses the vulnerability by correcting how .NET and .NET Core applications handle XML document processing.

Solutions

msft-kb4055269-537fc3ba-4248-40b8-9498-8a671abebfe9-kb4054172msft-kb4055269-537fc3ba-4248-40b8-9498-8a671abebfe9-kb4054176msft-kb4055269-537fc3ba-4248-40b8-9498-8a671abebfe9-kb4054183msft-kb4055269-bf2df578-f134-46cb-ba69-16bc34fc592d-kb4054176msft-kb4055269-fdecaf44-50a3-4667-a935-f9e7af0bb317-kb4054172msft-kb4055269-fdecaf44-50a3-4667-a935-f9e7af0bb317-kb4054176msft-kb4055269-fdecaf44-50a3-4667-a935-f9e7af0bb317-kb4054183msft-kb4055270-31f13fa5-cfe3-411e-9048-5de152f2485f-kb4054171msft-kb4055270-31f13fa5-cfe3-411e-9048-5de152f2485f-kb4054175msft-kb4055270-31f13fa5-cfe3-411e-9048-5de152f2485f-kb4054181msft-kb4055270-370c3401-f6b9-41fb-a31e-aaeb69e69c2e-kb4054171msft-kb4055270-370c3401-f6b9-41fb-a31e-aaeb69e69c2e-kb4054175msft-kb4055270-370c3401-f6b9-41fb-a31e-aaeb69e69c2e-kb4054181msft-kb4055270-d92cbae4-c736-4cb6-805b-6d4964a2e88b-kb4054171msft-kb4055270-d92cbae4-c736-4cb6-805b-6d4964a2e88b-kb4054175msft-kb4055270-d92cbae4-c736-4cb6-805b-6d4964a2e88b-kb4054181msft-kb4055271-0f6efea5-e7fe-4bab-80fa-4033e4a017ab-kb4054170msft-kb4055271-0f6efea5-e7fe-4bab-80fa-4033e4a017ab-kb4054177msft-kb4055271-0f6efea5-e7fe-4bab-80fa-4033e4a017ab-kb4054182msft-kb4055271-5d01e572-6b11-4db1-bf45-394cafbebf76-kb4054170msft-kb4055271-5d01e572-6b11-4db1-bf45-394cafbebf76-kb4054177msft-kb4055271-5d01e572-6b11-4db1-bf45-394cafbebf76-kb4054182msft-kb4055272-5e01da27-c82b-4f70-b55e-57221b9f41b8-kb4054174msft-kb4055272-cda76bdd-be44-4581-8ab9-b7a6e512b3b1-kb4054172msft-kb4055272-cda76bdd-be44-4581-8ab9-b7a6e512b3b1-kb4054174msft-kb4055272-cda76bdd-be44-4581-8ab9-b7a6e512b3b1-kb4054183msft-kb4055272-d6d7bbdb-3d44-41ed-8910-5914f268ae50-kb4054172msft-kb4055272-d6d7bbdb-3d44-41ed-8910-5914f268ae50-kb4054174msft-kb4055272-d6d7bbdb-3d44-41ed-8910-5914f268ae50-kb4054183msft-kb4056888-664639c3-95e4-4deb-8b34-0d599c0a582bmsft-kb4056888-c0708f93-30a8-47ad-9892-f807c6f83014msft-kb4056890-92aedd4d-0cea-4906-8353-0a8dea97f44cmicrosoft-windows-windows_server_2016-1607-kb4056890msft-kb4056890-e149510e-1e4a-4263-8eea-d09548b516a6msft-kb4056891-64a4a722-8ee1-4315-8977-b970916497a7msft-kb4056891-74b9cfdd-c2b4-4094-a7ac-49dafeacb837msft-kb4056892-f5928a6a-8aba-4be4-8a38-07688e23afc5msft-kb4056892-ff4a4508-e334-4006-bdde-c87f2a4f32ebmsft-kb4056893-006fa0ad-ba96-48b9-9d76-ba3746a04127msft-kb4056893-421eb4c2-e9fc-4207-b853-e9737bfe0c6b

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.