.NET Framework and .NET Core Denial of Service Vulnerability - CVE-2019-0820ID: oval:org.secpod.oval:def:54694 | Date: (C)2019-05-15 (M)2024-03-06 |
Class: VULNERABILITY | Family: windows |
A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to a .NET Framework (or .NET core) application. The update addresses the vulnerability by correcting how .NET Framework and .NET Core applications handle RegEx string processing.
Platform: |
Microsoft Windows 11 |
Microsoft Windows Server 2022 |
Microsoft Windows 10 |
Microsoft Windows 7 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows Server 2019 |
Product: |
Microsoft .NET core runtime 1.0 |
Microsoft .NET core runtime 1.1 |
Microsoft .NET core runtime 2.1 |
Microsoft .NET core runtime 2.2 |
Microsoft .NET Framework 2.0 |
Microsoft .NET Framework 3.0 |
Microsoft .NET Framework 3.5.1 |
Microsoft .NET Framework 4.5.2 |
Microsoft .NET Framework 4.6.2 |
Microsoft .NET Framework 4.6.1 |
Microsoft .NET Framework 4.6 |
Microsoft .NET Framework 3.5 |
Microsoft .NET Framework 4.7 |
Microsoft .NET Framework 4.7.1 |
Microsoft .NET Framework 4.7.2 |
Microsoft .NET Framework 4.8 |
Microsoft PowerShell Core 6.1 |
Microsoft PowerShell Core 6.2 |