vulnerability

Microsoft CVE-2018-8517: .NET Framework Denial Of Service Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Dec 11, 2018
Added
Dec 11, 2018
Modified
Nov 3, 2022

Description

A denial of service vulnerability exists when .NET Framework improperly handles special web requests.
An attacker who successfully exploited this vulnerability could cause a denial of service against an .NET Framework web application. The vulnerability can be exploited remotely, without authentication.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application.
The update addresses the vulnerability by correcting how the .NET Framework web application handles web requests.

Solutions

microsoft-windows-windows_server_2016-1607-kb4471321msft-kb4471321-7df4436e-0ced-46c1-885f-8b7f28c90b57msft-kb4471321-d8cbc402-b6d7-4dee-afea-4cd24f17f7a9msft-kb4471324-0e2209a8-b313-4182-a691-bc0359625c49msft-kb4471324-9ba7b397-2fd3-4ba9-bfee-3ed1dd3eb602msft-kb4471327-3cf458e0-ccb2-4d2b-aedb-ec7c5662ed3fmsft-kb4471327-d3230f4d-8567-48b1-84a5-01a6297f6c0dmsft-kb4471329-4596bf15-3446-45d2-b7ee-f8f13d8975c8msft-kb4471329-d0c3a1b3-42d6-447b-b120-4553beaa0b0bmsft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470493msft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470500msft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470600msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470493msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470500msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470600msft-kb4471981-a3b296e6-8cbd-4145-be86-c2b5f1c0e3fd-kb4470600msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470492msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470498msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470601msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470492msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470498msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470601msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470492msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470498msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470601msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470491msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470499msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470602msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470491msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470499msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470602msft-kb4471984-5ba74972-550f-4e78-b440-853923312500-kb4470493msft-kb4471984-5ba74972-550f-4e78-b440-853923312500-kb4470500msft-kb4471984-ef30e56f-8e93-4413-97b3-2b770147fcfa-kb4470493msft-kb4471984-ef30e56f-8e93-4413-97b3-2b770147fcfa-kb4470500msft-kb4470490-f9b56e97-7bdf-4a8d-8c0d-6ace59f4868dmsft-kb4470633-3ffdc285-bc65-4e9f-87d8-f31af9a58e7d

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.