Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-0875 (GCVE-0-2018-0875)
Vulnerability from cvelistv5
- Denial of Service
URL | Tags | ||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft Corporation | .NET Core |
Version: .NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability". |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:44:11.381Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "103225", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103225" }, { "name": "1040505", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040505" }, { "name": "RHSA-2018:0522", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": ".NET Core", "vendor": "Microsoft Corporation", "versions": [ { "status": "affected", "version": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] } ], "datePublic": "2018-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "103225", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103225" }, { "name": "1040505", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040505" }, { "name": "RHSA-2018:0522", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "DATE_PUBLIC": "2018-03-14T00:00:00", "ID": "CVE-2018-0875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": ".NET Core", "version": { "version_data": [ { "version_value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] } } ] }, "vendor_name": "Microsoft Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "103225", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103225" }, { "name": "1040505", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040505" }, { "name": "RHSA-2018:0522", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2018-0875", "datePublished": "2018-03-14T17:00:00Z", "dateReserved": "2017-12-01T00:00:00", "dateUpdated": "2024-09-16T17:33:24.246Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-0875\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2018-03-14T17:29:00.980\",\"lastModified\":\"2024-11-21T03:39:08.307\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \\\".NET Core Denial of Service Vulnerability\\\".\"},{\"lang\":\"es\",\"value\":\".NET Core 1.0, .NET Core 1.1, NET Core 2.0 y PowerShell Core 6.0.0 permiten una vulnerabilidad de denegaci\u00f3n de servicio (DoS) debido a la forma en la que se gestionan las peticiones especialmente manipuladas. Esto tambi\u00e9n se conoce como \\\".NET Core Denial of Service Vulnerability\\\".\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0913F82A-985A-401D-89F6-191684A8AB55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8256236D-D4F0-4207-B82D-18B0135CEB4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"345222C2-CD5B-4613-9FF3-9D034974D54F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:powershell_core:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D6A900C-6173-466A-B54D-683A12F53138\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/103225\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040505\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0522\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/103225\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1040505\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:0522\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
rhsa-2018_0522
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and rh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed software framework. It implements a subset of the .NET framework APIs and includes a CLR implementation.\n\nNew versions of .NET Core that address several security vulnerabilities are now available. The updated versions are .NET Core 1.0.10, 1.1.7, and 2.0.6. \n\nThese correspond to the March 2018 security release by .NET Core upstream projects.\n\nSecurity Fix(es):\n\n* .NET Core: Hash Collision Denial of Service (CVE-2018-0875)\n\nRed Hat would like to thank Ben Adams (Illyriad Games) for reporting this issue.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0522", "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1552060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552060" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0522.json" } ], "title": "Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update", "tracking": { "current_release_date": "2024-11-14T23:40:49+00:00", "generator": { "date": "2024-11-14T23:40:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:0522", "initial_release_date": "2018-03-14T16:24:56+00:00", "revision_history": [ { "date": "2018-03-14T16:24:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-14T16:24:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T23:40:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } } ], "category": "product_family", "name": ".NET Core on Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-sdk-2.1@2.1.101-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-host@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-debuginfo@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-runtime-2.0@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product_id": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore-debuginfo@1.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product_id": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore@1.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product_id": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore@1.0.10-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product_id": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore-debuginfo@1.0.10-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product_id": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet@2.0.6-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product_id": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore@1.1.7-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product_id": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore@1.0.10-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Adams" ], "organization": "Illyriad Games" } ], "cve": "CVE-2018-0875", "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552060" } ], "notes": [ { "category": "description", "text": "It was found that string comparisons in .NET Core did not use a secure hashing algorithm. This could allow an attacker to predict string hashes and cause a denial of service by intentionally creating collisions thus forcing long look up times.", "title": "Vulnerability description" }, { "category": "summary", "text": "Core: Hash Collision Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0875" }, { "category": "external", "summary": "RHBZ#1552060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552060" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875" } ], "release_date": "2018-03-13T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-14T16:24:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Core: Hash Collision Denial of Service" } ] }
RHSA-2018:0522
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and rh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed software framework. It implements a subset of the .NET framework APIs and includes a CLR implementation.\n\nNew versions of .NET Core that address several security vulnerabilities are now available. The updated versions are .NET Core 1.0.10, 1.1.7, and 2.0.6. \n\nThese correspond to the March 2018 security release by .NET Core upstream projects.\n\nSecurity Fix(es):\n\n* .NET Core: Hash Collision Denial of Service (CVE-2018-0875)\n\nRed Hat would like to thank Ben Adams (Illyriad Games) for reporting this issue.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0522", "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1552060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552060" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0522.json" } ], "title": "Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update", "tracking": { "current_release_date": "2025-10-10T02:12:18+00:00", "generator": { "date": "2025-10-10T02:12:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2018:0522", "initial_release_date": "2018-03-14T16:24:56+00:00", "revision_history": [ { "date": "2018-03-14T16:24:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-14T16:24:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T02:12:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } } ], "category": "product_family", "name": ".NET Core on Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-sdk-2.1@2.1.101-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-host@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-debuginfo@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-runtime-2.0@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product_id": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore-debuginfo@1.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product_id": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore@1.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product_id": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore@1.0.10-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product_id": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore-debuginfo@1.0.10-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product_id": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet@2.0.6-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product_id": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore@1.1.7-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product_id": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore@1.0.10-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Adams" ], "organization": "Illyriad Games" } ], "cve": "CVE-2018-0875", "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552060" } ], "notes": [ { "category": "description", "text": "It was found that string comparisons in .NET Core did not use a secure hashing algorithm. This could allow an attacker to predict string hashes and cause a denial of service by intentionally creating collisions thus forcing long look up times.", "title": "Vulnerability description" }, { "category": "summary", "text": "Core: Hash Collision Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0875" }, { "category": "external", "summary": "RHBZ#1552060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552060" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875" } ], "release_date": "2018-03-13T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-14T16:24:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Core: Hash Collision Denial of Service" } ] }
rhsa-2018:0522
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and rh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat Enterprise Linux.\n\nRed Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": ".NET Core is a managed software framework. It implements a subset of the .NET framework APIs and includes a CLR implementation.\n\nNew versions of .NET Core that address several security vulnerabilities are now available. The updated versions are .NET Core 1.0.10, 1.1.7, and 2.0.6. \n\nThese correspond to the March 2018 security release by .NET Core upstream projects.\n\nSecurity Fix(es):\n\n* .NET Core: Hash Collision Denial of Service (CVE-2018-0875)\n\nRed Hat would like to thank Ben Adams (Illyriad Games) for reporting this issue.\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:0522", "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "1552060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552060" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_0522.json" } ], "title": "Red Hat Security Advisory: .NET Core on Red Hat Enterprise Linux security update", "tracking": { "current_release_date": "2025-10-10T02:12:18+00:00", "generator": { "date": "2025-10-10T02:12:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2018:0522", "initial_release_date": "2018-03-14T16:24:56+00:00", "revision_history": [ { "date": "2018-03-14T16:24:56+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-03-14T16:24:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-10T02:12:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:2.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.1::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } }, { "category": "product_name", "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": ".NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_dotnet:1.0::el7" } } } ], "category": "product_family", "name": ".NET Core on Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-sdk-2.1@2.1.101-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-host@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-debuginfo@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product_id": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet-runtime-2.0@2.0.6-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product_id": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore-debuginfo@1.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product_id": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore@1.1.7-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product_id": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore@1.0.10-1.el7?arch=x86_64" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product_id": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore-debuginfo@1.0.10-1.el7?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product_id": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnet20-dotnet@2.0.6-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product_id": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore11-dotnetcore@1.1.7-1.el7?arch=src" } } }, { "category": "product_version", "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product_id": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-dotnetcore10-dotnetcore@1.0.10-1.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7Server-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64" }, "product_reference": "rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64" }, "product_reference": "rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-1.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64 as a component of .NET Core on Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" }, "product_reference": "rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "relates_to_product_reference": "7Workstation-dotNET-2.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Adams" ], "organization": "Illyriad Games" } ], "cve": "CVE-2018-0875", "discovery_date": "2018-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1552060" } ], "notes": [ { "category": "description", "text": "It was found that string comparisons in .NET Core did not use a secure hashing algorithm. This could allow an attacker to predict string hashes and cause a denial of service by intentionally creating collisions thus forcing long look up times.", "title": "Vulnerability description" }, { "category": "summary", "text": "Core: Hash Collision Denial of Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-0875" }, { "category": "external", "summary": "RHBZ#1552060", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1552060" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-0875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875" } ], "release_date": "2018-03-13T16:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-03-14T16:24:56+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7ComputeNode-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Server-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Server-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Server-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.src", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.0:rh-dotnetcore10-dotnetcore-debuginfo-0:1.0.10-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.src", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-1.1:rh-dotnetcore11-dotnetcore-debuginfo-0:1.1.7-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.src", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-debuginfo-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-host-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-runtime-2.0-0:2.0.6-1.el7.x86_64", "7Workstation-dotNET-2.0:rh-dotnet20-dotnet-sdk-2.1-0:2.1.101-1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Core: Hash Collision Denial of Service" } ] }
CERTFR-2018-AVI-133
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans les produits Microsoft. Elles permettent à un attaquant de provoquer une élévation de privilèges, une divulgation d'informations, une exécution de code à distance et un déni de service
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
Microsoft | N/A | ChakraCore | ||
Microsoft | N/A | PowerShell Core 6.0.0 | ||
Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 7 | ||
Microsoft | N/A | Microsoft Exchange Server 2013 Cumulative Update 19 | ||
Microsoft | N/A | Microsoft Exchange Server 2013 Service Pack 1 | ||
Microsoft | N/A | Microsoft Access 2016 (édition 32 bits) | ||
Microsoft | N/A | Microsoft Exchange Server 2013 Cumulative Update 18 | ||
Microsoft | N/A | Microsoft Access 2013 Service Pack 1 (éditions 32 bits) | ||
Microsoft | N/A | Microsoft Access 2010 Service Pack 2 (éditions 64 bits) | ||
Microsoft | N/A | Microsoft Access 2016 (édition 64 bits) | ||
Microsoft | N/A | Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20 | ||
Microsoft | N/A | Microsoft Access 2013 Service Pack 1 (éditions 64 bits) | ||
Microsoft | N/A | Microsoft Access 2010 Service Pack 2 (éditions 32 bits) | ||
Microsoft | N/A | Microsoft Exchange Server 2016 Cumulative Update 8 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "ChakraCore", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "PowerShell Core 6.0.0", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Exchange Server 2016 Cumulative Update 7", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Exchange Server 2013 Cumulative Update 19", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Exchange Server 2013 Service Pack 1", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Access 2016 (\u00e9dition 32 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Exchange Server 2013 Cumulative Update 18", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Access 2013 Service Pack 1 (\u00e9ditions 32 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Access 2010 Service Pack 2 (\u00e9ditions 64 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Access 2016 (\u00e9dition 64 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Access 2013 Service Pack 1 (\u00e9ditions 64 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Access 2010 Service Pack 2 (\u00e9ditions 32 bits)", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "Microsoft Exchange Server 2016 Cumulative Update 8", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-0940", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0940" }, { "name": "CVE-2018-0875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0875" }, { "name": "CVE-2018-0930", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0930" }, { "name": "CVE-2018-0937", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0937" }, { "name": "CVE-2018-0924", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0924" }, { "name": "CVE-2018-0874", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0874" }, { "name": "CVE-2018-0936", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0936" }, { "name": "CVE-2018-0903", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0903" }, { "name": "CVE-2018-0931", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0931" }, { "name": "CVE-2018-0873", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0873" }, { "name": "CVE-2018-0941", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0941" }, { "name": "CVE-2018-0891", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0891" }, { "name": "CVE-2018-0925", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0925" }, { "name": "CVE-2018-0933", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0933" }, { "name": "CVE-2018-0872", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0872" }, { "name": "CVE-2018-0934", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0934" }, { "name": "CVE-2018-0939", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0939" } ], "initial_release_date": "2018-03-14T00:00:00", "last_revision_date": "2018-03-14T00:00:00", "links": [], "reference": "CERTFR-2018-AVI-133", "revisions": [ { "description": "Version initiale", "revision_date": "2018-03-14T00:00:00.000000" } ], "risks": [ { "description": "Divulgation d\u0027informations" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "D\u00e9ni de service" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eles produits Microsoft\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une divulgation\nd\u0027informations, une ex\u00e9cution de code \u00e0 distance et un d\u00e9ni de service\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 13 mars 2018", "url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance/advisory/" } ] }
CERTFR-2018-AVI-132
Vulnerability from certfr_avis
De multiples vulnérabilités ont été corrigées dans Microsoft .Net. Elles permettent à un attaquant de provoquer une élévation de privilèges et un déni de service
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneTitle | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": ".NET Core 1.0", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": "ASP.NET Core 2.0", "product": { "name": ".Net", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": ".NET Core 2.0", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } }, { "description": ".NET Core 1.1", "product": { "name": "N/A", "vendor": { "name": "Microsoft", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2018-0875", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0875" }, { "name": "CVE-2018-0787", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0787" }, { "name": "CVE-2018-0808", "url": "https://www.cve.org/CVERecord?id=CVE-2018-0808" } ], "initial_release_date": "2018-03-14T00:00:00", "last_revision_date": "2018-03-14T00:00:00", "links": [], "reference": "CERTFR-2018-AVI-132", "revisions": [ { "description": "Version initiale", "revision_date": "2018-03-14T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMicrosoft .Net\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft .Net", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 Microsoft du 13 mars 2018", "url": "https://portal.msrc.microsoft.com/fr-FR/security-guidance/advisory/" } ] }
fkie_cve-2018-0875
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
secure@microsoft.com | http://www.securityfocus.com/bid/103225 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | http://www.securitytracker.com/id/1040505 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | https://access.redhat.com/errata/RHSA-2018:0522 | Third Party Advisory | |
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103225 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040505 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2018:0522 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875 | Patch, Vendor Advisory |
Vendor | Product | Version | |
---|---|---|---|
microsoft | asp.net_core | 1.0 | |
microsoft | asp.net_core | 1.1 | |
microsoft | asp.net_core | 2.0 | |
microsoft | powershell_core | 6.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "0913F82A-985A-401D-89F6-191684A8AB55", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "8256236D-D4F0-4207-B82D-18B0135CEB4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "345222C2-CD5B-4613-9FF3-9D034974D54F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:powershell_core:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2D6A900C-6173-466A-B54D-683A12F53138", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." }, { "lang": "es", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 y PowerShell Core 6.0.0 permiten una vulnerabilidad de denegaci\u00f3n de servicio (DoS) debido a la forma en la que se gestionan las peticiones especialmente manipuladas. Esto tambi\u00e9n se conoce como \".NET Core Denial of Service Vulnerability\"." } ], "id": "CVE-2018-0875", "lastModified": "2024-11-21T03:39:08.307", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-14T17:29:00.980", "references": [ { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103225" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040505" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040505" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2018-0875
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-0875", "description": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "id": "GSD-2018-0875", "references": [ "https://access.redhat.com/errata/RHSA-2018:0522" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-0875" ], "details": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "id": "GSD-2018-0875", "modified": "2023-12-13T01:22:25.165854Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "DATE_PUBLIC": "2018-03-14T00:00:00", "ID": "CVE-2018-0875", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": ".NET Core", "version": { "version_data": [ { "version_value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] } } ] }, "vendor_name": "Microsoft Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "103225", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103225" }, { "name": "1040505", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040505" }, { "name": "RHSA-2018:0522", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:0522" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[1.0,1.1],[2.0]", "affected_versions": "All versions starting from 1.0 up to 1.1, version 2.0", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2021-08-12", "description": ".NET Core, .NET Core, NET Core and PowerShell Core allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "fixed_versions": [ "2.0.0-preview1-final", "2.0.3" ], "identifier": "CVE-2018-0875", "identifiers": [ "CVE-2018-0875" ], "not_impacted": "All versions before 1.0, all versions after 1.1 before 2.0, all versions after 2.0", "package_slug": "nuget/Microsoft.AspNetCore.All", "pubdate": "2018-03-14", "solution": "Upgrade to versions 2.0.0-preview1-final, 2.0.3 or above.", "title": "Uncontrolled Resource Consumption", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "https://access.redhat.com/errata/RHSA-2018:0522", "http://www.securitytracker.com/id/1040505", "http://www.securityfocus.com/bid/103225" ], "uuid": "5503f312-9102-4b71-b967-89fa5b538e51" }, { "affected_range": "(,1.0.12),[1.1.0,1.1.7),[2.0.0,2.0.6)", "affected_versions": "All versions before 1.0.12, all versions starting from 1.1.0 before 1.1.7, all versions starting from 2.0.0 before 2.0.6", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "cwe_ids": [ "CWE-1035", "CWE-937" ], "date": "2022-10-25", "description": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "fixed_versions": [ "1.1.7", "2.0.6", "1.0.12" ], "identifier": "CVE-2018-0875", "identifiers": [ "GHSA-xcvr-qv8h-m7xw", "CVE-2018-0875" ], "not_impacted": "All versions starting from 1.0.12 before 1.1.0, all versions starting from 1.1.7 before 2.0.0, all versions starting from 2.0.6", "package_slug": "nuget/Microsoft.NETCore.Jit", "pubdate": "2022-05-13", "solution": "Upgrade to versions 1.1.7, 2.0.6, 1.0.12 or above.", "title": ".NET Core Denial of Service Vulnerability", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "https://access.redhat.com/errata/RHSA-2018:0522", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "http://www.securityfocus.com/bid/103225", "http://www.securitytracker.com/id/1040505", "https://github.com/dotnet/announcements/issues/62", "https://github.com/advisories/GHSA-xcvr-qv8h-m7xw" ], "uuid": "44b07373-693d-4898-82b9-8c07e7bef442" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:powershell_core:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2018-0875" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "name": "RHSA-2018:0522", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "name": "1040505", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040505" }, { "name": "103225", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103225" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2021-08-12T17:19Z", "publishedDate": "2018-03-14T17:29Z" } } }
ghsa-xcvr-qv8h-m7xw
Vulnerability from github
.NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability".
{ "affected": [ { "package": { "ecosystem": "NuGet", "name": "Microsoft.NETCore.Jit" }, "ranges": [ { "events": [ { "introduced": "2.0.0" }, { "fixed": "2.0.6" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.NETCore.Jit" }, "ranges": [ { "events": [ { "introduced": "1.1.0" }, { "fixed": "1.1.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "NuGet", "name": "Microsoft.NETCore.Jit" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "1.0.12" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2018-0875" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2022-10-25T17:35:35Z", "nvd_published_at": "2018-03-14T17:29:00Z", "severity": "HIGH" }, "details": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\".", "id": "GHSA-xcvr-qv8h-m7xw", "modified": "2022-10-25T17:35:35Z", "published": "2022-05-13T01:07:06Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875" }, { "type": "WEB", "url": "https://github.com/dotnet/announcements/issues/62" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:0522" }, { "type": "WEB", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/103225" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1040505" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ], "summary": ".NET Core Denial of Service Vulnerability" }
cnvd-2018-06772
Vulnerability from cnvd
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875
Name | ['Microsoft .NET Core 1.0', 'Microsoft .NET Core 1.1', 'Microsoft .NET Core 2.0', 'Microsoft .NET Core 6.0.0'] |
---|
{ "bids": { "bid": { "bidNumber": "103225" } }, "cves": { "cve": { "cveNumber": "CVE-2018-0875", "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0875" } }, "description": "Microsoft .NET Core\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u5957\u514d\u8d39\u7684\u5f00\u6e90\u5f00\u53d1\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u5177\u6709\u591a\u8bed\u8a00\u652f\u6301\u548c\u8de8\u5e73\u53f0\u7b49\u7279\u70b9\u3002PowerShell Core\u662f\u4e00\u6b3e\u57fa\u4e8e.NET Core\u5e73\u53f0\u7684\u4efb\u52a1\u81ea\u52a8\u5316\u548c\u7ba1\u7406\u6846\u67b6\u3002\r\n\r\nMicrosoft .NET Core\u548cPowerShell Core\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u5c11\u91cf\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u6563\u5217\u51b2\u7a81\uff09\u3002", "discovererName": "Ben Adams of Illyriad Games", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2018-06772", "openTime": "2018-03-29", "patchDescription": "Microsoft .NET Core\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4e00\u5957\u514d\u8d39\u7684\u5f00\u6e90\u5f00\u53d1\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u5177\u6709\u591a\u8bed\u8a00\u652f\u6301\u548c\u8de8\u5e73\u53f0\u7b49\u7279\u70b9\u3002PowerShell Core\u662f\u4e00\u6b3e\u57fa\u4e8e.NET Core\u5e73\u53f0\u7684\u4efb\u52a1\u81ea\u52a8\u5316\u548c\u7ba1\u7406\u6846\u67b6\u3002\r\n\r\nMicrosoft .NET Core\u548cPowerShell Core\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u53d1\u9001\u5c11\u91cf\u7684\u8bf7\u6c42\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u6563\u5217\u51b2\u7a81\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Microsoft .NET Core\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Microsoft .NET Core 1.0", "Microsoft .NET Core 1.1", "Microsoft .NET Core 2.0", "Microsoft .NET Core 6.0.0" ] }, "referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-0875", "serverity": "\u4e2d", "submitTime": "2018-03-15", "title": "Microsoft .NET Core\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
var-201803-1708
Vulnerability from variot
.NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka ".NET Core Denial of Service Vulnerability". Microsoft .NET is prone to a denial-of-service vulnerability. Successful exploits will attackers to cause performance to degrade resulting in a denial of service condition. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
===================================================================== Red Hat Security Advisory
Synopsis: Low: .NET Core on Red Hat Enterprise Linux security update Advisory ID: RHSA-2018:0522-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:0522 Issue date: 2018-03-14 CVE Names: CVE-2018-0875 =====================================================================
- Summary:
Updates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and rh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat Enterprise Linux.
Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- It implements a subset of the .NET framework APIs and includes a CLR implementation.
These correspond to the March 2018 security release by .NET Core upstream projects.
Security Fix(es):
- .NET Core: Hash Collision Denial of Service (CVE-2018-0875)
Red Hat would like to thank Ben Adams (Illyriad Games) for reporting this issue.
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Package List:
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm
x86_64: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm
x86_64: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):
Source: rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm
x86_64: rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm
x86_64: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm
x86_64: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Server (v. 7):
Source: rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm
x86_64: rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm
x86_64: rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm
x86_64: rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm
.NET Core on Red Hat Enterprise Linux Workstation (v. 7):
Source: rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm
x86_64: rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2018-0875 https://access.redhat.com/security/updates/classification/#low
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iD8DBQFaqUTsXlSAg2UNWIIRAuzUAKCDhqW/mE1ZwG1Bv9JVc2oVTo7cngCfUnVc slFh/sAwzwax82xICfw1G1M= =37s1 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201803-1708", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asp.net core", "scope": "eq", "trust": 1.9, "vendor": "microsoft", "version": "2.0" }, { "model": "asp.net core", "scope": "eq", "trust": 1.9, "vendor": "microsoft", "version": "1.1" }, { "model": "asp.net core", "scope": "eq", "trust": 1.9, "vendor": "microsoft", "version": "1.0" }, { "model": "powershell core", "scope": "eq", "trust": 1.4, "vendor": "microsoft", "version": "6.0.0" }, { "model": "powershell core", "scope": "eq", "trust": 1.3, "vendor": "microsoft", "version": "6.0" }, { "model": ".net core", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "1.0" }, { "model": ".net core", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "1.1" }, { "model": ".net core", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "2.0" } ], "sources": [ { "db": "BID", "id": "103225" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "CNNVD", "id": "CNNVD-201803-522" }, { "db": "NVD", "id": "CVE-2018-0875" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:microsoft:.net_core", "vulnerable": true }, { "cpe22Uri": "cpe:/a:microsoft:powershell_core", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ben Adams of Illyriad Games", "sources": [ { "db": "BID", "id": "103225" } ], "trust": 0.3 }, "cve": "CVE-2018-0875", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-0875", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-0875", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-0875", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2018-0875", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201803-522", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "CNNVD", "id": "CNNVD-201803-522" }, { "db": "NVD", "id": "CVE-2018-0875" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": ".NET Core 1.0, .NET Core 1.1, NET Core 2.0 and PowerShell Core 6.0.0 allow a denial of Service vulnerability due to how specially crafted requests are handled, aka \".NET Core Denial of Service Vulnerability\". Microsoft .NET is prone to a denial-of-service vulnerability. \nSuccessful exploits will attackers to cause performance to degrade resulting in a denial of service condition. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Low: .NET Core on Red Hat Enterprise Linux security update\nAdvisory ID: RHSA-2018:0522-01\nProduct: .NET Core on Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:0522\nIssue date: 2018-03-14\nCVE Names: CVE-2018-0875 \n=====================================================================\n\n1. Summary:\n\nUpdates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and\nrh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat\nEnterprise Linux. \n\nRed Hat Product Security has rated this update as having a security impact\nof Low. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. It implements a subset of the\n.NET framework APIs and includes a CLR implementation. \n\nThese correspond to the March 2018 security release by .NET Core upstream\nprojects. \n\nSecurity Fix(es):\n\n* .NET Core: Hash Collision Denial of Service (CVE-2018-0875)\n\nRed Hat would like to thank Ben Adams (Illyriad Games) for reporting this\nissue. \n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm\nrh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm\nrh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nrh-dotnet20-dotnet-2.0.6-1.el7.src.rpm\n\nx86_64:\nrh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm\nrh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm\nrh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Server (v. 7):\n\nSource:\nrh-dotnet20-dotnet-2.0.6-1.el7.src.rpm\n\nx86_64:\nrh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm\nrh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm\n\nx86_64:\nrh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm\nrh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm\n\n.NET Core on Red Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nrh-dotnet20-dotnet-2.0.6-1.el7.src.rpm\n\nx86_64:\nrh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm\nrh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-0875\nhttps://access.redhat.com/security/updates/classification/#low\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niD8DBQFaqUTsXlSAg2UNWIIRAuzUAKCDhqW/mE1ZwG1Bv9JVc2oVTo7cngCfUnVc\nslFh/sAwzwax82xICfw1G1M=\n=37s1\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2018-0875" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "BID", "id": "103225" }, { "db": "PACKETSTORM", "id": "146768" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-0875", "trust": 2.8 }, { "db": "BID", "id": "103225", "trust": 1.9 }, { "db": "SECTRACK", "id": "1040505", "trust": 1.6 }, { "db": "JVNDB", "id": "JVNDB-2018-002560", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201803-522", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "146768", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "103225" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "PACKETSTORM", "id": "146768" }, { "db": "CNNVD", "id": "CNNVD-201803-522" }, { "db": "NVD", "id": "CVE-2018-0875" } ] }, "id": "VAR-201803-1708", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.19172932 }, "last_update_date": "2024-11-23T22:41:53.763000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "CVE-2018-0875 | .NET Core Denial of Service Vulnerability", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0875" }, { "title": "CVE-2018-0875 | .NET Core \u306e\u30b5\u30fc\u30d3\u30b9\u62d2\u5426\u306e\u8106\u5f31\u6027", "trust": 0.8, "url": "https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2018-0875" }, { "title": "Microsoft .NET Core and PowerShell Core Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79171" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "CNNVD", "id": "CNNVD-201803-522" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-20", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "NVD", "id": "CVE-2018-0875" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2018-0875" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:0522" }, { "trust": 1.6, "url": "http://www.securitytracker.com/id/1040505" }, { "trust": 1.6, "url": "http://www.securityfocus.com/bid/103225" }, { "trust": 0.9, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0875" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0875" }, { "trust": 0.8, "url": "https://www.ipa.go.jp/security/ciadr/vul/20180314-ms.html" }, { "trust": 0.8, "url": "http://www.jpcert.or.jp/at/2018/at180011.html" }, { "trust": 0.3, "url": "http://www.microsoft.com/net/" }, { "trust": 0.3, "url": "http://www.microsoft.com" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#low" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-0875" }, { "trust": 0.1, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" } ], "sources": [ { "db": "BID", "id": "103225" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "PACKETSTORM", "id": "146768" }, { "db": "CNNVD", "id": "CNNVD-201803-522" }, { "db": "NVD", "id": "CVE-2018-0875" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "103225" }, { "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "db": "PACKETSTORM", "id": "146768" }, { "db": "CNNVD", "id": "CNNVD-201803-522" }, { "db": "NVD", "id": "CVE-2018-0875" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-13T00:00:00", "db": "BID", "id": "103225" }, { "date": "2018-04-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "date": "2018-03-15T15:52:13", "db": "PACKETSTORM", "id": "146768" }, { "date": "2018-03-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-522" }, { "date": "2018-03-14T17:29:00.980000", "db": "NVD", "id": "CVE-2018-0875" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-03-13T00:00:00", "db": "BID", "id": "103225" }, { "date": "2018-04-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-002560" }, { "date": "2020-10-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201803-522" }, { "date": "2024-11-21T03:39:08.307000", "db": "NVD", "id": "CVE-2018-0875" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-522" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": ".NET Core and PowerShell Core Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-002560" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201803-522" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.