Miggo Logo

CVE-2024-38095:
Microsoft Security Advisory CVE-2024-38095 | .NET Denial of Service Vulnerability

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.7884%
Published
7/9/2024
Updated
8/8/2024
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
Microsoft.NetCore.App.Runtime.linux-armnuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.linux-armnuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.linux-arm64nuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.linux-arm64nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.linux-musl-armnuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.linux-musl-armnuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.linux-musl-arm64nuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.linux-musl-arm64nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.linux-musl-x64nuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.linux-musl-x64nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.linux-x64nuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.linux-x64nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.osx-arm64nuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.osx-arm64nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.osx-x64nuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.osx-x64nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.win-armnuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.win-armnuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.win-arm64nuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.win-arm64nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.win-x64nuget>= 8.0.0, <= 8.0.68.0.7
Microsoft.NetCore.App.Runtime.win-x64nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.win-x86nuget>= 6.0.0, <= 6.0.316.0.32
Microsoft.NetCore.App.Runtime.win-x86nuget>= 8.0.0, <= 8.0.68.0.7
System.Formats.Asn1nuget>= 5.0.0-preview.7.20364.11, < 6.0.16.0.1
System.Formats.Asn1nuget>= 7.0.0-preview.1.22076.8, < 8.0.18.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory identifies the vulnerability in System.Formats.Asn1's handling of X.509 certificate parsing but does not explicitly name specific functions or methods. While the root cause is improper input validation (CWE-20) during ASN.1 decoding, the provided documentation and references (including GitHub advisories and Microsoft's bulletin) do not disclose exact function names or file paths. The vulnerability likely resides in ASN.1 parsing logic related to certificate processing, but without access to patch diffs or explicit technical details, specific functions cannot be identified with high confidence.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# Mi*roso*t S**urity **visory *V*-****-***** | .N*T **ni*l o* S*rvi** Vuln*r**ility ## <* n*m*="*x**utiv*-summ*ry"></*>*x**utiv* summ*ry Mi*roso*t is r*l**sin* t*is s**urity **visory to provi** in*orm*tion **out * vuln*r**ility in .N*T *.* *n* .N*T

Reasoning

T** **visory i**nti*i*s t** vuln*r**ility in `Syst*m.*orm*ts.*sn*`'s **n*lin* o* X.*** **rti*i**t* p*rsin* *ut *o*s not *xpli*itly n*m* sp**i*i* *un*tions or m*t*o*s. W*il* t** root **us* is improp*r input v*li**tion (*W*-**) *urin* *SN.* ***o*in*, t