Rapid7 Vulnerability & Exploit Database

Microsoft CVE-2018-8517: .NET Framework Denial Of Service Vulnerability

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Microsoft CVE-2018-8517: .NET Framework Denial Of Service Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
12/11/2018
Created
03/19/2019
Added
12/11/2018
Modified
11/03/2022

Description

A denial of service vulnerability exists when .NET Framework improperly handles special web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an .NET Framework web application. The vulnerability can be exploited remotely, without authentication. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application. The update addresses the vulnerability by correcting how the .NET Framework web application handles web requests.

Solution(s)

  • msft-kb4471321-1f82da30-7a0c-4189-8206-b8bd846fc40a
  • msft-kb4471321-7df4436e-0ced-46c1-885f-8b7f28c90b57
  • msft-kb4471321-d8cbc402-b6d7-4dee-afea-4cd24f17f7a9
  • msft-kb4471324-0e2209a8-b313-4182-a691-bc0359625c49
  • msft-kb4471324-9ba7b397-2fd3-4ba9-bfee-3ed1dd3eb602
  • msft-kb4471324-b00ee170-59ea-4273-b954-98e3cdc792e2
  • msft-kb4471327-3cf458e0-ccb2-4d2b-aedb-ec7c5662ed3f
  • msft-kb4471327-d3230f4d-8567-48b1-84a5-01a6297f6c0d
  • msft-kb4471329-4596bf15-3446-45d2-b7ee-f8f13d8975c8
  • msft-kb4471329-8397c215-e9e9-4016-9c86-a53138d613ad
  • msft-kb4471329-d0c3a1b3-42d6-447b-b120-4553beaa0b0b
  • msft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470493
  • msft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470500
  • msft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470600
  • msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470493
  • msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470500
  • msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470600
  • msft-kb4471981-a3b296e6-8cbd-4145-be86-c2b5f1c0e3fd-kb4470600
  • msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470492
  • msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470498
  • msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470601
  • msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470492
  • msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470498
  • msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470601
  • msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470492
  • msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470498
  • msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470601
  • msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470491
  • msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470499
  • msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470602
  • msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470491
  • msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470499
  • msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470602
  • msft-kb4471984-5ba74972-550f-4e78-b440-853923312500-kb4470493
  • msft-kb4471984-5ba74972-550f-4e78-b440-853923312500-kb4470500
  • msft-kb4471984-ef30e56f-8e93-4413-97b3-2b770147fcfa-kb4470493
  • msft-kb4471984-ef30e56f-8e93-4413-97b3-2b770147fcfa-kb4470500
  • msft-kb4470490-f9b56e97-7bdf-4a8d-8c0d-6ace59f4868d
  • msft-kb4470633-3ffdc285-bc65-4e9f-87d8-f31af9a58e7d

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;