.NET Denial of Service Vulnerability
Package
Affected versions
>= 5.0.0, < 5.0.14
>= 6.0.0, < 6.0.2
Patched versions
5.0.14
6.0.2
>= 5.0.0, < 5.0.14
>= 6.0.0, < 6.0.2
5.0.14
6.0.2
>= 5.0.0, < 5.0.14
>= 6.0.0, < 6.0.2
5.0.14
6.0.2
>= 5.0.0, < 5.0.14
>= 6.0.0, < 6.0.2
5.0.14
6.0.2
>= 5.0.0, < 5.0.14
>= 6.0.0, < 6.0.2
5.0.14
6.0.2
>= 5.0.0, < 5.0.14
>= 6.0.0, < 6.0.2
5.0.14
6.0.2
>= 5.0.0, < 5.0.14
>= 6.0.0, < 6.0.2
5.0.14
6.0.2
Description
Published by the National Vulnerability Database
Feb 9, 2022
Published to the GitHub Advisory Database
Oct 21, 2022
Reviewed
Oct 21, 2022
Last updated
Jun 30, 2023
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0 and .NET 5.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A Denial of Service vulnerability exists in .NET 6.0 and .NET 5.0 when the Kestrel web server processes certain HTTP/2 and HTTP/3 requests.
Affected Software
Patches
To fix the issue, please install the latest version of .NET 6.0 or .NET 5.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.
If you're using .NET Core 6.0, you should download and install Runtime 6.0.2 or SDK 6.0.102 (for Visual Studio 2022 v17.1) from https://dotnet.microsoft.com/download/dotnet-core/6.0.
If you're using .NET 5.0, you should download and install Runtime 5.0.14 or SDK 5.0.114 (for Visual Studio 2019 v16.8) or SDK 5.0.405 (for Visual Studio 2011 v16.11) from https://dotnet.microsoft.com/download/dotnet-core/5.0.
.NET 6.0 and .NET 5.0 updates are also available from Microsoft Update. To access this either type "Check for updates" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.
Other Details
References