cnvd-2020-62336
Vulnerability from cnvd

Title: Microsoft .NET Framework和.NET Core拒绝服务漏洞(CNVD-2020-62336)

Description:

Microsoft .NET Core和Microsoft .NET Framework都是美国微软(Microsoft)公司的产品。.NET Core是一套免费的开源开发平台。该平台具有多语言支持和跨平台等特点。Microsoft .NET Framework是一种全面且一致的编程模型,也是一个用于构建Windows、Windows Store、Windows Phone、Windows Server和Microsoft Azure的应用程序的开发平台。该平台包括C#和Visual Basic编程语言、公共语言运行库和广泛的类库。

Microsoft .NET Framework和Microsoft .NET Core中存在安全漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。目前没有详细的漏洞细节提供。

Severity:

Patch Name: Microsoft .NET Framework和.NET Core拒绝服务漏洞(CNVD-2020-62336)的补丁

Patch Description:

Microsoft .NET Core和Microsoft .NET Framework都是美国微软(Microsoft)公司的产品。.NET Core是一套免费的开源开发平台。该平台具有多语言支持和跨平台等特点。Microsoft .NET Framework是一种全面且一致的编程模型,也是一个用于构建Windows、Windows Store、Windows Phone、Windows Server和Microsoft Azure的应用程序的开发平台。该平台包括C#和Visual Basic编程语言、公共语言运行库和广泛的类库。

Microsoft .NET Framework和Microsoft .NET Core中存在安全漏洞。该漏洞源于网络系统或产品对系统资源(如内存、磁盘空间、文件等)的管理不当。目前没有详细的漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。

Formal description:

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-0820

Reference: http://www.securityfocus.com/bid/108245

Impacted products
Name
['Microsoft .NET Framework 2.0', 'Microsoft .NET Framework 3.5', 'Microsoft .NET Framework 3.5.1', 'Microsoft .Net Framework 3.0', 'Microsoft .Net Framework 4.5.2', 'Microsoft Microsoft .NET Framework 4.6', 'Microsoft .NET Framework 4.6.2', 'Microsoft .NET Framework 4.7', 'Microsoft ASP.NET Core 1.0', 'Microsoft ASP.NET Core 1.1', 'Microsoft .NET Framework 4.7.1', 'Microsoft .NET Framework 4.7.2', 'Microsoft .NET Framework 4.6.1', 'Microsoft ASP.NET Core 2.1', 'Microsoft ASP.NET Core 2.2', 'Microsoft .NET Framework 4.8']
Show details on source website


{
  "bids": {
    "bid": {
      "bidNumber": "108245"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2019-0820",
      "cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0820"
    }
  },
  "description": "Microsoft .NET Core\u548cMicrosoft .NET Framework\u90fd\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002.NET Core\u662f\u4e00\u5957\u514d\u8d39\u7684\u5f00\u6e90\u5f00\u53d1\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u5177\u6709\u591a\u8bed\u8a00\u652f\u6301\u548c\u8de8\u5e73\u53f0\u7b49\u7279\u70b9\u3002Microsoft .NET Framework\u662f\u4e00\u79cd\u5168\u9762\u4e14\u4e00\u81f4\u7684\u7f16\u7a0b\u6a21\u578b\uff0c\u4e5f\u662f\u4e00\u4e2a\u7528\u4e8e\u6784\u5efaWindows\u3001Windows Store\u3001Windows Phone\u3001Windows Server\u548cMicrosoft Azure\u7684\u5e94\u7528\u7a0b\u5e8f\u7684\u5f00\u53d1\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u5305\u62ecC\uff03\u548cVisual Basic\u7f16\u7a0b\u8bed\u8a00\u3001\u516c\u5171\u8bed\u8a00\u8fd0\u884c\u5e93\u548c\u5e7f\u6cdb\u7684\u7c7b\u5e93\u3002\n\nMicrosoft .NET Framework\u548cMicrosoft .NET Core\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5bf9\u7cfb\u7edf\u8d44\u6e90\uff08\u5982\u5185\u5b58\u3001\u78c1\u76d8\u7a7a\u95f4\u3001\u6587\u4ef6\u7b49\uff09\u7684\u7ba1\u7406\u4e0d\u5f53\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://portal.msrc.microsoft.com/zh-CN/security-guidance/advisory/CVE-2019-0820",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2020-62336",
  "openTime": "2020-11-11",
  "patchDescription": "Microsoft .NET Core\u548cMicrosoft .NET Framework\u90fd\u662f\u7f8e\u56fd\u5fae\u8f6f\uff08Microsoft\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u3002.NET Core\u662f\u4e00\u5957\u514d\u8d39\u7684\u5f00\u6e90\u5f00\u53d1\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u5177\u6709\u591a\u8bed\u8a00\u652f\u6301\u548c\u8de8\u5e73\u53f0\u7b49\u7279\u70b9\u3002Microsoft .NET Framework\u662f\u4e00\u79cd\u5168\u9762\u4e14\u4e00\u81f4\u7684\u7f16\u7a0b\u6a21\u578b\uff0c\u4e5f\u662f\u4e00\u4e2a\u7528\u4e8e\u6784\u5efaWindows\u3001Windows Store\u3001Windows Phone\u3001Windows Server\u548cMicrosoft Azure\u7684\u5e94\u7528\u7a0b\u5e8f\u7684\u5f00\u53d1\u5e73\u53f0\u3002\u8be5\u5e73\u53f0\u5305\u62ecC\uff03\u548cVisual Basic\u7f16\u7a0b\u8bed\u8a00\u3001\u516c\u5171\u8bed\u8a00\u8fd0\u884c\u5e93\u548c\u5e7f\u6cdb\u7684\u7c7b\u5e93\u3002\r\n\r\nMicrosoft .NET Framework\u548cMicrosoft .NET Core\u4e2d\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7f51\u7edc\u7cfb\u7edf\u6216\u4ea7\u54c1\u5bf9\u7cfb\u7edf\u8d44\u6e90\uff08\u5982\u5185\u5b58\u3001\u78c1\u76d8\u7a7a\u95f4\u3001\u6587\u4ef6\u7b49\uff09\u7684\u7ba1\u7406\u4e0d\u5f53\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Microsoft .NET Framework\u548c.NET Core\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2020-62336\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Microsoft .NET Framework 2.0",
      "Microsoft .NET Framework 3.5",
      "Microsoft .NET Framework 3.5.1",
      "Microsoft .Net Framework 3.0",
      "Microsoft .Net Framework 4.5.2",
      "Microsoft Microsoft .NET Framework 4.6",
      "Microsoft .NET Framework 4.6.2",
      "Microsoft .NET Framework 4.7",
      "Microsoft ASP.NET Core 1.0",
      "Microsoft ASP.NET Core 1.1",
      "Microsoft .NET Framework 4.7.1",
      "Microsoft .NET Framework 4.7.2",
      "Microsoft .NET Framework 4.6.1",
      "Microsoft ASP.NET Core 2.1",
      "Microsoft ASP.NET Core 2.2",
      "Microsoft .NET Framework 4.8"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/108245",
  "serverity": "\u4e2d",
  "submitTime": "2019-05-23",
  "title": "Microsoft .NET Framework\u548c.NET Core\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2020-62336\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…