vulnerability
Microsoft CVE-2018-8517: .NET Framework Denial Of Service Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:N/I:N/A:P) | Dec 11, 2018 | Dec 11, 2018 | Nov 3, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
Dec 11, 2018
Added
Dec 11, 2018
Modified
Nov 3, 2022
Description
A denial of service vulnerability exists when .NET Framework improperly handles special web requests.
An attacker who successfully exploited this vulnerability could cause a denial of service against an .NET Framework web application. The vulnerability can be exploited remotely, without authentication.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application.
The update addresses the vulnerability by correcting how the .NET Framework web application handles web requests.
Solutions
microsoft-windows-windows_server_2016-1607-kb4471321msft-kb4471321-7df4436e-0ced-46c1-885f-8b7f28c90b57msft-kb4471321-d8cbc402-b6d7-4dee-afea-4cd24f17f7a9msft-kb4471324-0e2209a8-b313-4182-a691-bc0359625c49msft-kb4471324-9ba7b397-2fd3-4ba9-bfee-3ed1dd3eb602msft-kb4471327-3cf458e0-ccb2-4d2b-aedb-ec7c5662ed3fmsft-kb4471327-d3230f4d-8567-48b1-84a5-01a6297f6c0dmsft-kb4471329-4596bf15-3446-45d2-b7ee-f8f13d8975c8msft-kb4471329-d0c3a1b3-42d6-447b-b120-4553beaa0b0bmsft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470493msft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470500msft-kb4471981-57b9c92a-2f09-4ec7-820c-1ca670e212a3-kb4470600msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470493msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470500msft-kb4471981-92b26429-b7c1-49ca-b130-fa1f924a3dfb-kb4470600msft-kb4471981-a3b296e6-8cbd-4145-be86-c2b5f1c0e3fd-kb4470600msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470492msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470498msft-kb4471982-39154df1-5507-43d8-8fcc-7f6ad9c2d8e5-kb4470601msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470492msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470498msft-kb4471982-6e6a7b39-381e-4285-bc80-29d5c2cad4e7-kb4470601msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470492msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470498msft-kb4471982-b343b482-dd5a-4911-a9ec-05b46b0fef15-kb4470601msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470491msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470499msft-kb4471983-0fcc811c-48de-4c15-8240-5ccdb8171d8b-kb4470602msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470491msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470499msft-kb4471983-c1beaa3a-b04a-4008-bd55-cd5861098d2b-kb4470602msft-kb4471984-5ba74972-550f-4e78-b440-853923312500-kb4470493msft-kb4471984-5ba74972-550f-4e78-b440-853923312500-kb4470500msft-kb4471984-ef30e56f-8e93-4413-97b3-2b770147fcfa-kb4470493msft-kb4471984-ef30e56f-8e93-4413-97b3-2b770147fcfa-kb4470500msft-kb4470490-f9b56e97-7bdf-4a8d-8c0d-6ace59f4868dmsft-kb4470633-3ffdc285-bc65-4e9f-87d8-f31af9a58e7d
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.