Sicherheitsanfälligkeit in .NET Framework bezüglich Denial-of-Service
Veröffentlichung: 12. Apr. 2022
Zuletzt aktualisiert: 24. Juni 2024
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2022-26832
- Auswirkung
- Denial of Service
- Maximaler Schweregrad
- Wichtig
- CVSS Source
- Microsoft
- Vektorzeichenfolge
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 7.5 / 6.5Base-Score-Metriken: 7.5/Temporal-Score-Metriken: 6.5
Angriffsvektor
Netzwerk
Angriffskomplexität
Niedrig
Berechtigungen erforderlich
Keine
Benutzerinteraktion
Keine
Umfang
Unverändert
Vertraulichkeit
Keine
Integrität
Keine
Verfügbarkeit
Hoch
Exploit Code Maturity
Nicht belegt
Behebungsgrad
Offizieller Fix
Berichtszuverlässigkeit
Bestätigt
Weitere Informationen zur Definition dieser Metriken finden Sie unter Common Vulnerability Scoring System.
Ausnutzbarkeit
Die folgende Tabelle enthält eine Bewertung der Ausnutzbarkeit dieser Sicherheitsanfälligkeit zum Zeitpunkt der ursprünglichen Veröffentlichung.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Ausnutzung weniger wahrscheinlich
Danksagung
- Orange Tsai (@orange_8361) with DEVCORE
Sicherheitsupdates
Besuchen Sie die Seite Microsoft Lebenszyklusinformationen, um den Supportlebenszyklus für Ihre Softwareversion oder zu ermitteln.
- 10.0.14393.5066
- 10.0.14393.5066
- 10.0.14393.5066
- 10.0.14393.5066
- 4.7.3930.02
- 4.7.3930.02
- 4.8.4494.03
- 4.8.4494.03
- 4.8.4494.03
- 4.8.4494.03
- 2.0.50727.8962
- 2.0.50727.8962
- 2.0.50727.8962
- 2.0.50727.8962
- -
- 2.0.50727.8962
- Monthly Rollup
- Security Only
- -
- 2.0.50727.8962
- 2.0.50727.8962
- 2.0.50727.8962
- 2.0.50727.8962
- 2.0.50727.8962
- 2.0.50727.8962
- 2.0.50727.8962
- 4.7.03930.02
- 4.7.3930.01
- 2.0.50727.8962
- 2.0.50727.8962
- 52732.36732
- 4.0.52734.36734
- 4.8.4494.03
- 4.8.4494.03
- 4.8.4494.03
- 4.0.52732.36732
- 4.0.52734.36734
- 4.0.52730.36730
- 4.0.52730.36730
- 4.0.52730.36730
- 4.0.52730.3673
- 4.7.03930.02
- 4.7.3930.01
- 4.0.52732.36732
- 4.0.52734.36734
- 4.0.52732.36732
- 4.0.52734.36734
- 4.0.52730.36730
- 4.0.52730.3673
- Monthly Rollup
- 4.0.52730.36730
- 4.0.52730.36730
- 4.0.52730.3673
- 4.0.52732.36732
- 4.0.52734.36734
- 4.0.52732.36732
- 4.0.52734.36734
- 6.1.50727.8962
- 2.0.50727.8962
- 6.1.50727.8962
- 2.0.50727.8962
- 6.1.50727.8962
- 2.0.50727.8962
- 6.1.50727.8962
- 2.0.50727.8962
- -
- 2.0.50727.8962
- -
- 2.0.50727.8962
Haftungsausschluss
Revisionen
Updated the build numbers. This is an informational update only.
To comprehensively address this vulnerability, Microsoft has released Monthly Rollup KB5016268 for .NET Framework 3.5 installed on Windows 8.1 and Windows Server 2012 R2. Microsoft strongly recommends that customers install the update to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.
In the Security Updates table, added .NET Framework 4.6.2/4.7/4.7.1/4.7.2 installed on Windows 10 version 1607, Windows Server 2016, and Windows Server 2016 (Server Core installation) as these versions of Window 10 and Windows Server with .NET Framework 4.6.2/4.7/4.7.1/4.7.2 installed are affected by this vulnerability. Customers running these versions of .NET Framework should install the April 2022 security updates to be protected from this vulnerability.
In the Security Updates table, added .NET Framework 4.8 installed on Windows Server 2016 and Windows Server 2016 (Server Core installation), .NET Framework 3.5 and 4.7.2 intalled on Windows Server 2019 and Windows Server 2019 (Server Core installation), and .NET Framework 3.5 and 4.8 installed on Windows Server 2019 and Windows Server 2019 (Server Core installation) as these versions of Windows Server with these versions of .NET Framework installed are affected by this vulnerability. Customers running these versions of .NET Framework should install the April 2022 security updates to be protected from this vulnerability.
Information published.