Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-63vf-8cxj-r6hq

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumption for a (1) stale or (2) closed connection, as exploited in the wild in February 2014, aka "POST Request DoS Vulnerability."

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumption for a (1) stale or (2) closed connection, as exploited in the wild in February 2014, aka "POST Request DoS Vulnerability."

EPSS

Процентиль: 95%
0.18722
Средний

Дефекты

CWE-20

Связанные уязвимости

nvd
больше 11 лет назад

Microsoft .NET Framework 1.1 SP1, 2.0 SP2, 3.5, 3.5.1, 4, 4.5, and 4.5.1 does not properly determine TCP connection states, which allows remote attackers to cause a denial of service (ASP.NET daemon hang) via crafted HTTP requests that trigger persistent resource consumption for a (1) stale or (2) closed connection, as exploited in the wild in February 2014, aka "POST Request DoS Vulnerability."

fstec
больше 11 лет назад

Уязвимость программного обеспечения Microsoft .NET Framework, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации

EPSS

Процентиль: 95%
0.18722
Средний

Дефекты

CWE-20