vulnerability

Microsoft CVE-2019-0980: .Net Framework and .Net Core Denial of Service Vulnerability

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
May 14, 2019
Added
May 14, 2019
Modified
Jan 31, 2023

Description

A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET Framework or .NET Core web application. The vulnerability can be exploited remotely, without authentication.
A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework or .NET Core application.
The update addresses the vulnerability by correcting how .NET Framework or .NET Core web applications handles web requests.

Solution(s)

msft-kb4494440-4091b3b1-890f-4344-bf2c-cd6cc084a9a6msft-kb4495584-111e26b5-2c16-49c4-afc6-08a321f8030dmsft-kb4495584-263b1a16-ac1f-48e8-bda6-bf63a81a6193msft-kb4495584-f2bd4fcb-e104-4478-9868-a18a1081e2ecmsft-kb4495586-1f4f6123-e562-45fc-812d-8565feda7068msft-kb4495586-8c9959a1-1474-4705-bee2-38d1bd9da8d3msft-kb4495587-0d812232-271a-4257-b0df-8c7a29e76178msft-kb4495587-4eb47b64-242f-49d4-9535-f9d2306f0adfmsft-kb4495587-b200b093-517a-4e9c-b99e-52e32cd35cdfmsft-kb4495587-c4d2428f-3853-451a-accf-e8dae8639ca3msft-kb4495589-a9ec66a1-5804-4856-833c-097710280055msft-kb4495589-e464cb4c-64c9-495f-9e32-3cbb77b8c33emsft-kb4495590-0d1617e9-76aa-4525-85d6-2ff0492edaf2msft-kb4495590-2359145f-3b72-40e1-aabb-d49ff89d1edemsft-kb4495590-286128ba-ffdd-4095-96da-835a273bddb5msft-kb4495591-397c2db2-1184-4369-9876-23d84e0f15demsft-kb4495591-7031d09d-7eed-4c2b-afee-46e880d9f024msft-kb4495591-72b98aa5-9139-4838-876f-a5920acb2bd4msft-kb4495593-09d0a396-3cf0-4f37-97b7-e9cae8c84a0fmsft-kb4495593-16f35359-81fb-4b30-a567-da9bf3713a0dmsft-kb4495593-c05c68f5-3db1-4712-b037-b6bd490ec983msft-kb4495593-eb85eff3-bbc4-493e-8a50-c7a6e39b45famsft-kb4495607-4a87ac49-68ca-4ad1-a15f-8fca8bb8e9f5msft-kb4495607-759188e4-80d2-4f61-bf48-9c576e56aaf7msft-kb4495607-9d695869-ad1e-4a59-9e02-95328a8a80bbmsft-kb4495609-15da3709-c66d-4b60-9e48-0f5cf5a7b49cmsft-kb4495609-38e63fc3-0e5f-4aa2-a6bf-a04098b3d9famsft-kb4495609-ec2c9f09-11d0-463f-9230-9d9aaeb98f74msft-kb4495610-20f30b7c-93e5-45c8-8ebe-1c9822b24be6msft-kb4495610-56da1195-0fe0-4ec3-a27b-1fdeb10e579cmsft-kb4495610-a743bc90-9261-4226-8f1d-6a1914e042a3msft-kb4495611-3af98ae7-fcce-4cc6-aafc-d34d1828699cmsft-kb4495611-76c23c2d-3a79-4316-a945-521d2ae5db67msft-kb4495612-91bfe1d2-b4be-4504-a9b2-f4c38663f9cemsft-kb4495612-ae0f9a48-bff7-456e-ad5f-63ab8a7b408cmsft-kb4495612-d573d583-a0d2-4599-beb7-bee2b00c85f0msft-kb4495613-18bfffaf-f04f-40ab-8d53-2d7f80a2cc65msft-kb4495613-77b79a17-8c91-49cd-992c-d4cf8bca412amsft-kb4495615-043be643-8514-40ac-af05-e5c06eac82bemsft-kb4495615-33b5bb44-c34b-41c9-81ac-f128eb0d92f1msft-kb4495616-6beeae0c-5eba-41e7-a36f-25d066e9996bmsft-kb4495616-9319f393-a04b-4784-bdf4-7ce106f5ebcbmsft-kb4495616-f2fb1ffc-8697-4a95-9550-3c480ea955efmsft-kb4495618-088084f7-8813-482e-8695-74621a46e83amsft-kb4495618-0ad89e2b-00ec-4224-bad3-570438f6f3bamsft-kb4495618-4895753d-ae40-4b12-8734-7b75d5439675msft-kb4495620-01301843-6f2b-4267-bbb2-990e6b4cc220msft-kb4495620-6d85d92c-4647-4e6b-8d8d-ec40d6baeb16msft-kb4495620-ece422b0-873e-4c15-afe2-81bbc7fa7889msft-kb4495623-07b1475a-2536-4379-a411-4dc4d3f09a9bmsft-kb4495623-427cb263-7a52-436b-adbb-c336b0db3149msft-kb4495623-f9b10ac5-763b-4272-9732-2bb9179cdf5fmsft-kb4495625-3ec878d7-3a5a-4a37-b691-8bbc9149ec58msft-kb4495625-82e46d3d-cb44-4610-a86a-7ddbe155df09msft-kb4495627-7be33f12-75e7-482d-ac41-c6b21e103574msft-kb4495627-9496645b-f3b5-4276-a891-141881e4cdbcmsft-kb4499167-2ea0586a-8e8e-4677-bcd7-0d821e1f3e9c
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.