vulnerability

Microsoft CVE-2018-8360: .NET Framework Information Disclosure Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Aug 14, 2018
Added
Aug 14, 2018
Modified
Nov 18, 2021

Description

An information disclosure vulnerability exists in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections where content from one stream can blend into another stream.
To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.
The security update addresses the vulnerability by correcting the way .NET Framework handles high-load/high-density network connections.

Solutions

msft-kb4343885-a06825f6-41f1-4dda-8182-99725d2718b0msft-kb4343885-aa3d8e16-b3c9-4adf-92c4-f7dad57f2825microsoft-windows-windows_server_2016-1607-kb4343887msft-kb4343887-c796509e-8bbb-4de4-b45f-92de37e32d36msft-kb4343887-cffa7f5a-126a-48d4-9cb6-5541b12e862emsft-kb4343892-0c24fb3d-ed27-4461-bb0c-5905b7bc4bfcmsft-kb4343892-fbad4042-4e60-473e-a4ef-e3b1761dba11msft-kb4343897-ceb32db8-813d-4ab3-818c-e740f4a18a38msft-kb4343897-d48f1d9a-72aa-46fc-b493-ea21346badbfmsft-kb4343909-4493244a-d754-4ffd-9b1e-c248e1b14e03msft-kb4343909-d4a86d98-3a49-4ab9-ba67-db4c0279d576msft-kb4345679-1b11fddd-9a22-472e-a412-ef225a5de41a-kb4344167msft-kb4345679-1b11fddd-9a22-472e-a412-ef225a5de41a-kb4344173msft-kb4345679-1b11fddd-9a22-472e-a412-ef225a5de41a-kb4344177msft-kb4345679-9017e50c-8440-4320-816b-cda1493fbd6f-kb4344167msft-kb4345679-9017e50c-8440-4320-816b-cda1493fbd6f-kb4344173msft-kb4345679-9017e50c-8440-4320-816b-cda1493fbd6f-kb4344177msft-kb4345679-d0e92286-c693-47df-ab23-4e7bc83bf3a6-kb4344177msft-kb4345680-157995a0-2b42-4154-9e37-f1e0240d9a8c-kb4344165msft-kb4345680-157995a0-2b42-4154-9e37-f1e0240d9a8c-kb4344172msft-kb4345680-157995a0-2b42-4154-9e37-f1e0240d9a8c-kb4344175msft-kb4345680-7b26d6f1-937c-4171-86ab-bd89e50b5a4e-kb4344165msft-kb4345680-7b26d6f1-937c-4171-86ab-bd89e50b5a4e-kb4344172msft-kb4345680-7b26d6f1-937c-4171-86ab-bd89e50b5a4e-kb4344175msft-kb4345680-ccb830c9-1ca8-4873-8de9-8dc3b9bd6451-kb4344165msft-kb4345680-ccb830c9-1ca8-4873-8de9-8dc3b9bd6451-kb4344172msft-kb4345680-ccb830c9-1ca8-4873-8de9-8dc3b9bd6451-kb4344175msft-kb4345681-0c4e3f40-bd63-41ae-b207-af4b1b6d6735-kb4344166msft-kb4345681-0c4e3f40-bd63-41ae-b207-af4b1b6d6735-kb4344171msft-kb4345681-0c4e3f40-bd63-41ae-b207-af4b1b6d6735-kb4344178msft-kb4345681-c601cf7a-ba23-4d6d-bcdc-c61c258e7f1f-kb4344166msft-kb4345681-c601cf7a-ba23-4d6d-bcdc-c61c258e7f1f-kb4344171msft-kb4345681-c601cf7a-ba23-4d6d-bcdc-c61c258e7f1f-kb4344178msft-kb4345682-734871fb-860a-481e-ac5d-87fad8e85d04-kb4344167msft-kb4345682-734871fb-860a-481e-ac5d-87fad8e85d04-kb4344173msft-kb4345682-734871fb-860a-481e-ac5d-87fad8e85d04-kb4344176msft-kb4345682-d4b1b193-ceac-47aa-ab3f-40577650d824-kb4344176msft-kb4345682-ff3688d8-960e-4600-938d-b3322b8ddb84-kb4344167msft-kb4345682-ff3688d8-960e-4600-938d-b3322b8ddb84-kb4344173msft-kb4345682-ff3688d8-960e-4600-938d-b3322b8ddb84-kb4344176

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.