Action not permitted
Modal body text goes here.
CVE-2018-0875
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | http://www.securityfocus.com/bid/103225 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | http://www.securitytracker.com/id/1040505 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | https://access.redhat.com/errata/RHSA-2018:0522 | Third Party Advisory | |
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875 | Patch, Vendor Advisory |
▼ | Vendor | Product |
---|---|---|
Microsoft Corporation | .NET Core |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:44:11.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "103225", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103225" }, { "name": "1040505", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040505" }, { "name": "RHSA-2018:0522", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": ".NET Core", "vendor": "Microsoft Corporation", "versions": [ { "status": "affected", "version": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] } ], "datePublic": "2018-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "103225", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103225" }, { "name": "1040505", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040505" }, { "name": "RHSA-2018:0522", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "DATE_PUBLIC": "2018-03-14T00:00:00", "ID": "CVE-2018-0875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": ".NET Core", "version": { "version_data": [ { "version_value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] } } ] }, "vendor_name": "Microsoft Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "103225", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103225" }, { "name": "1040505", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040505" }, { "name": "RHSA-2018:0522", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2018-0875", "datePublished": "2018-03-14T17:00:00Z", "dateReserved": "2017-12-01T00:00:00", "dateUpdated": "2024-09-16T17:33:24.246Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-0875\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2018-03-14T17:29:00.980\",\"lastModified\":\"2021-08-12T17:19:05.447\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \\\".NET Core Denial of Service Vulnerability\\\".\"},{\"lang\":\"es\",\"value\":\".NET Core 1.0, .NET Core 1.1, NET Core 2.0 y PowerShell Core 6.0.0 permiten una vulnerabilidad de denegaci\u00f3n de servicio (DoS) debido a la forma en la que se gestionan las peticiones especialmente manipuladas. Esto tambi\u00e9n se conoce como \\\".NET Core Denial of Service Vulnerability\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0913F82A-985A-401D-89F6-191684A8AB55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8256236D-D4F0-4207-B82D-18B0135CEB4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345222C2-CD5B-4613-9FF3-9D034974D54F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:powershell_core:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6A900C-6173-466A-B54D-683A12F53138\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103225\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040505\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0522\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
var-201803-1708
Vulnerability from variot
.NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability". Microsoft .NET is prone to a denial-of-service vulnerability. Successful exploits will attackers to cause performance to degrade resulting in a denial of service condition. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Low: .NET Core on Red Hat Enterprise Linux security update Advisory ID: RHSA-2018:0522-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0522 Issue date: 2018-03-14 CVE Names: CVE-2018-0875 =====================================================================
- Summary:
Updates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and rh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- It implements a subset of the .NET framework APIs and includes a CLR implementation.
These correspond to the March 2018 security release by .NET Core upstream projects.
Security Fix(es):
- .NET Core: Hash Collision Denial of Service (CVE-2018-0875)
Red Hat would like to thank Ben Adams (Illyriad Games) for reporting this issue.
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm
x86_64: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm
x86_64: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm
x86_64: rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm
x86_64: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm
x86_64: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm
x86_64: rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm
x86_64: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm
x86_64: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm
x86_64: rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2018-0875 https://access.redhat.com/security/updates/classification/#low
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFaqUTsXlSAg2UNWIIRAuzUAKCDhqW/mE1ZwG1Bv9JVc2oVTo7cngCfUnVc slFh/sAwzwax82xICfw1G1M= =37s1 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1708", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asp.net core", "scope": "eq", "trust": 1.9, "vendor": "microsoft", "version": "2.0" }, { "model": "asp.net core", "scope": "eq", "trust": 1.9, "vendor": "microsoft", "version": "1.1" }, { "model": "asp.net core", "scope": "eq", "trust": 1.9, "vendor": "microsoft", "version": "1.0" }, { "model": "powershell core", "scope": "eq", "trust": 1.4, "vendor": "microsoft", "version": "6.0.0" }, { "model": "powershell core", "scope": "eq", "trust": 1.3, "vendor": "microsoft", "version": "6.0" }, { "model": ".net core", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "1.0" }, { "model": ".net core", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "1.1" }, { "model": ".net core", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "2.0" } ], "sources": [ { "db": "BID", "id": "103225" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "NVD", "id": "CVE-2018-0875" }, { "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:powershell_core:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2018-0875" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ben Adams of Illyriad Games", "sources": [ { "db": "BID", "id": "103225" } ], "trust": 0.3 }, "cve": "CVE-2018-0875", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0875", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-0875", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2018-0875", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201803-522", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "NVD", "id": "CVE-2018-0875" }, { "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\". Microsoft .NET is prone to a denial-of-service vulnerability. \nSuccessful exploits will attackers to cause performance to degrade resulting in a denial of service condition. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Low: .NET Core on Red Hat Enterprise Linux security update\nAdvisory ID: RHSA-2018:0522-01\nProduct: .NET Core on Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:0522\nIssue date: 2018-03-14\nCVE Names: CVE-2018-0875 \n=====================================================================\n\n1. Summary:\n\nUpdates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and\nrh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat\nEnterprise Linux. \n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. It implements a subset of the\n.NET framework APIs and includes a CLR implementation. \n\nThese correspond to the March 2018 security release by .NET Core upstream\nprojects. \n\nSecurity Fix(es):\n\n* .NET Core: Hash Collision Denial of Service (CVE-2018-0875)\n\nRed Hat would like to thank Ben Adams (Illyriad Games) for reporting this\nissue. \n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm\nrh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm\nrh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnet20-dotnet-2.0.6-1.el7.src.rpm\n\nx86_64:\nrh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm\nrh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm\nrh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnet20-dotnet-2.0.6-1.el7.src.rpm\n\nx86_64:\nrh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm\nrh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm\nrh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnet20-dotnet-2.0.6-1.el7.src.rpm\n\nx86_64:\nrh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-0875\nhttps://access.redhat.com/security/updates/classification/#low\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFaqUTsXlSAg2UNWIIRAuzUAKCDhqW/mE1ZwG1Bv9JVc2oVTo7cngCfUnVc\nslFh/sAwzwax82xICfw1G1M=\n=37s1\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2018-0875" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "BID", "id": "103225" }, { "db": "PACKETSTORM", "id": "146768" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0875", "trust": 2.8 }, { "db": "BID", "id": "103225", "trust": 1.9 }, { "db": "SECTRACK", "id": "1040505", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2018-002560", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-522", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "146768", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "103225" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "PACKETSTORM", "id": "146768" }, { "db": "NVD", "id": "CVE-2018-0875" }, { "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "id": "VAR-201803-1708", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.21178882 }, "last_update_date": "2023-12-18T14:05:29.802000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2018-0875 | .NET Core Denial of Service Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-0875" }, { "title": "CVE-2018-0875 | .NET Core \u306e\u30b5\u30fc\u30d3\u30b9\u62d2\u5426\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/cve-2018-0875" }, { "title": "Microsoft .NET Core and PowerShell Core Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=79171" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "NVD", "id": "CVE-2018-0875" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-0875" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:0522" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/103225" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id/1040505" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0875" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0875" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20180314-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2018/at180011.html" }, { "trust": 0.3, "url": "http://www.microsoft.com/net/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#low" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-0875" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" } ], "sources": [ { "db": "BID", "id": "103225" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "PACKETSTORM", "id": "146768" }, { "db": "NVD", "id": "CVE-2018-0875" }, { "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "103225" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "PACKETSTORM", "id": "146768" }, { "db": "NVD", "id": "CVE-2018-0875" }, { "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-13T00:00:00", "db": "BID", "id": "103225" }, { "date": "2018-04-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "date": "2018-03-15T15:52:13", "db": "PACKETSTORM", "id": "146768" }, { "date": "2018-03-14T17:29:00.980000", "db": "NVD", "id": "CVE-2018-0875" }, { "date": "2018-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-13T00:00:00", "db": "BID", "id": "103225" }, { "date": "2018-04-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "date": "2021-08-12T17:19:05.447000", "db": "NVD", "id": "CVE-2018-0875" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-522" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": ".NET Core and PowerShell Core Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-522" } ], "trust": 0.6 } }
rhsa-2018_0522
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and rh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed software framework. It implements a subset of the .NET framework APIs and includes a CLR implementation.\n\nNew versions of .NET Core that address several security vulnerabilities are now available. The updated versions are .NET Core 1.0.10, 1.1.7, and 2.0.6. \n\nThese correspond to the March 2018 security release by .NET Core upstream projects.\n\nSecurity Fix(es):\n\n* .NET Core: Hash Collision Denial of Service (CVE-2018-0875)\n\nRed Hat would like to thank Ben Adams (Illyriad Games) for reporting this issue.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0522", "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1552060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552060" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0522.json" } ], "title": "Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update", "tracking": { "current_release_date": "2024-11-05T20:25:47+00:00", "generator": { "date": "2024-11-05T20:25:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2018:0522", "initial_release_date": "2018-03-14T16:24:56+00:00", "revision_history": [ { "date": "2018-03-14T16:24:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-14T16:24:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T20:25:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } } ], "category": "product_family", "name": ".NET Core on Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-sdk-2.1@2.1.101-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-host@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-debuginfo@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-runtime-2.0@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product_id": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore-debuginfo@1.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product_id": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore@1.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product_id": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore@1.0.10-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product_id": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore-debuginfo@1.0.10-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product_id": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet@2.0.6-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product_id": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore@1.1.7-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product_id": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore@1.0.10-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Adams" ], "organization": "Illyriad Games" } ], "cve": "CVE-2018-0875", "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552060" } ], "notes": [ { "category": "description", "text": "It was found that string comparisons in .NET Core did not use a secure hashing algorithm. This could allow an attacker to predict string hashes and cause a denial of service by intentionally creating collisions thus forcing long look up times.", "title": "Vulnerability description" }, { "category": "summary", "text": "Core: Hash Collision Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0875" }, { "category": "external", "summary": "RHBZ#1552060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552060" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875" } ], "release_date": "2018-03-13T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-14T16:24:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Core: Hash Collision Denial of Service" } ] }
ghsa-xcvr-qv8h-m7xw
Vulnerability from github
.NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability".
{ "affected": [ { "package": { "ecosystem": "NuGet", "name": "Microsoft.NETCore.Jit" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "fixed": "2.0.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.NETCore.Jit" }, "ranges": [ { "events": [ { "introduced": "1.1.0" }, { "fixed": "1.1.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.NETCore.Jit" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.0.12" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2018-0875" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2022-10-25T17:35:35Z", "nvd_published_at": "2018-03-14T17:29:00Z", "severity": "HIGH" }, "details": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "id": "GHSA-xcvr-qv8h-m7xw", "modified": "2022-10-25T17:35:35Z", "published": "2022-05-13T01:07:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875" }, { "type": "WEB", "url": "https://github.com/dotnet/announcements/issues/62" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103225" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040505" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": ".NET Core Denial of Service Vulnerability" }
gsd-2018-0875
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-0875", "description": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "id": "GSD-2018-0875", "references": [ "https://access.redhat.com/errata/RHSA-2018:0522" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-0875" ], "details": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "id": "GSD-2018-0875", "modified": "2023-12-13T01:22:25.165854Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "DATE_PUBLIC": "2018-03-14T00:00:00", "ID": "CVE-2018-0875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": ".NET Core", "version": { "version_data": [ { "version_value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] } } ] }, "vendor_name": "Microsoft Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "103225", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103225" }, { "name": "1040505", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040505" }, { "name": "RHSA-2018:0522", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[1.0,1.1],[2.0]", "affected_versions": "All versions starting from 1.0 up to 1.1, version 2.0", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2021-08-12", "description": ".NET Core, .NET Core, NET Core and PowerShell Core allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "fixed_versions": [ "2.0.0-preview1-final", "2.0.3" ], "identifier": "CVE-2018-0875", "identifiers": [ "CVE-2018-0875" ], "not_impacted": "All versions before 1.0, all versions after 1.1 before 2.0, all versions after 2.0", "package_slug": "nuget/Microsoft.AspNetCore.All", "pubdate": "2018-03-14", "solution": "Upgrade to versions 2.0.0-preview1-final, 2.0.3 or above.", "title": "Uncontrolled Resource Consumption", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "https://access.redhat.com/errata/RHSA-2018:0522", "http://www.securitytracker.com/id/1040505", "http://www.securityfocus.com/bid/103225" ], "uuid": "5503f312-9102-4b71-b967-89fa5b538e51" }, { "affected_range": "(,1.0.12),[1.1.0,1.1.7),[2.0.0,2.0.6)", "affected_versions": "All versions before 1.0.12, all versions starting from 1.1.0 before 1.1.7, all versions starting from 2.0.0 before 2.0.6", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-25", "description": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "fixed_versions": [ "1.1.7", "2.0.6", "1.0.12" ], "identifier": "CVE-2018-0875", "identifiers": [ "GHSA-xcvr-qv8h-m7xw", "CVE-2018-0875" ], "not_impacted": "All versions starting from 1.0.12 before 1.1.0, all versions starting from 1.1.7 before 2.0.0, all versions starting from 2.0.6", "package_slug": "nuget/Microsoft.NETCore.Jit", "pubdate": "2022-05-13", "solution": "Upgrade to versions 1.1.7, 2.0.6, 1.0.12 or above.", "title": ".NET Core Denial of Service Vulnerability", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "https://access.redhat.com/errata/RHSA-2018:0522", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "http://www.securityfocus.com/bid/103225", "http://www.securitytracker.com/id/1040505", "https://github.com/dotnet/announcements/issues/62", "https://github.com/advisories/GHSA-xcvr-qv8h-m7xw" ], "uuid": "44b07373-693d-4898-82b9-8c07e7bef442" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:powershell_core:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2018-0875" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "RHSA-2018:0522", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "name": "1040505", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040505" }, { "name": "103225", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103225" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2021-08-12T17:19Z", "publishedDate": "2018-03-14T17:29Z" } } }
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.