First published: Tue Aug 13 2024(Updated: )
.NET and Visual Studio Denial of Service Vulnerability
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft .NET 8.0 | ||
nuget/Microsoft.AspNetCore.App.Runtime.win-x86 | >=8.0.0<8.0.8 | 8.0.8 |
nuget/Microsoft.AspNetCore.App.Runtime.win-x64 | >=8.0.0<8.0.8 | 8.0.8 |
nuget/Microsoft.AspNetCore.App.Runtime.win-arm64 | >=8.0.0<8.0.8 | 8.0.8 |
nuget/Microsoft.AspNetCore.App.Runtime.win-arm | >=8.0.0<8.0.8 | 8.0.8 |
Visual Studio Professional 2022 | =17.6 | |
Visual Studio Professional 2022 | =17.10 | |
Visual Studio Professional 2022 | =17.8 | |
Microsoft .NET Framework | >=8.0.0<8.0.8 | |
Visual Studio Professional 2022 | >=17.6.0<17.6.18 | |
Visual Studio Professional 2022 | >=17.8.0<17.8.13 | |
Visual Studio Professional 2022 | >=17.10.0<17.10.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-38168 is classified as a Denial of Service vulnerability in .NET and Visual Studio.
To fix CVE-2024-38168, update to the patched versions of .NET 8.0 and Visual Studio 2022 that address this vulnerability.
CVE-2024-38168 affects Visual Studio 2022 versions 17.6, 17.8, and 17.10.
Yes, several packages in .NET 8, specifically versions between 8.0.0 and 8.0.8, are impacted by CVE-2024-38168.
CVE-2024-38168 could allow an attacker to cause a Denial of Service, disrupting the availability of the affected software.