First published: Tue Oct 10 2023(Updated: )
### Impact The MsQuic server will continue to leak memory until no more is available, resulting in a denial of service. ### Patches The following patch was made: - Fix Memory Leak from Multiple Decodes of TP - https://github.com/microsoft/msquic/commit/d364feeda0dd8b729eca6fef149c1ef98630f0cb ### Workarounds Beyond upgrading to the patched versions, there is no other workaround.
Credit: secure@microsoft.com secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft PowerShell 7.3 | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft .NET | >=7.0.0<=7.0.12 | |
Microsoft Windows 11 21h2 | <10.0.22000.2538 | |
Microsoft Windows 11 22h2 | <10.0.22621.2428 | |
Microsoft Windows Server 2022 | ||
nuget/Microsoft.Native.Quic.MsQuic.Schannel | <2.2.3 | 2.2.3 |
nuget/Microsoft.Native.Quic.MsQuic.OpenSSL | <2.2.3 | 2.2.3 |
Microsoft .NET 7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36435 is a Microsoft QUIC Denial of Service Vulnerability.
The severity of CVE-2023-36435 is high with a CVSS score of 7.5.
Microsoft Windows 11 (versions 21H2 and 22H2), Microsoft Windows Server 2022, and Microsoft .NET 7.0 are affected by CVE-2023-36435.
To fix CVE-2023-36435 on Windows 11 (version 21H2), install the patch KB5031358 from the Microsoft Catalog Update site.
To fix CVE-2023-36435 on Windows Server 2022, install the patch KB5031364 from the Microsoft Catalog Update site.