First published: Fri May 12 2017(Updated: )
Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability."
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft .NET Framework | =2.0-sp2 | |
Microsoft .NET Framework | =3.5 | |
Microsoft .NET Framework | =3.5.1 | |
Microsoft .NET Framework | =4.5.2 | |
Microsoft .NET Framework | =4.6 | |
Microsoft .NET Framework | =4.6.1 | |
Microsoft .NET Framework | =4.6.2 | |
Microsoft .NET Framework | =4.7 | |
nuget/Microsoft.AspNetCore.Mvc.WebApiCompatShim | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.WebApiCompatShim | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.ViewFeatures | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.ViewFeatures | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.TagHelpers | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.TagHelpers | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.Razor | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.Razor | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.Razor.Host | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.Razor.Host | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.Localization | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.Localization | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.Formatters.Xml | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.Formatters.Xml | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.Formatters.Json | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.Formatters.Json | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.DataAnnotations | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.DataAnnotations | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.Cors | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.Cors | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.ApiExplorer | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.ApiExplorer | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc.Abstractions | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.Abstractions | >=1.0.0<1.0.4 | 1.0.4 |
nuget/System.Net.WebSockets.Client | =4.3.0 | 4.3.1 |
nuget/System.Net.WebSockets.Client | =4.0.0 | 4.0.1 |
nuget/System.Net.Security | =4.3.0 | 4.3.1 |
nuget/System.Net.Security | =4.0.0 | 4.0.1 |
nuget/System.Net.Http.WinHttpHandler | =4.3.0 | 4.3.1 |
nuget/System.Net.Http.WinHttpHandler | =4.0.0 | 4.0.1 |
nuget/System.Text.Encodings.Web | =4.3.0 | 4.3.1 |
nuget/System.Text.Encodings.Web | =4.0.0 | 4.0.1 |
nuget/System.Net.Http | =4.3.1 | 4.3.2 |
nuget/System.Net.Http | =4.1.1 | 4.1.2 |
nuget/Microsoft.AspNetCore.Mvc.Core | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc.Core | >=1.0.0<1.0.4 | 1.0.4 |
nuget/Microsoft.AspNetCore.Mvc | >=1.1.0<1.1.3 | 1.1.3 |
nuget/Microsoft.AspNetCore.Mvc | >=1.0.0<1.0.4 | 1.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.