CVE-2024-38229: Microsoft Security Advisory CVE-2024-38229 | .NET Remote Code Execution Vulnerability
(updated )
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0 and .NET 9.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in ASP.NET when closing an HTTP/3 stream while application code is writing to the response body, a race condition may lead to use-after-free.
Note: HTTP/3 is experimental in .NET 6.0. If you are on .NET 6.0 and using HTTP/3, please upgrade to .NET 8.0.10. .NET 6.0 will not receive a security patch for this vulnerability.
References
- github.com/advisories/GHSA-7vw9-cfwx-9gx9
- github.com/dotnet/announcements/issues/326
- github.com/dotnet/aspnetcore
- github.com/dotnet/aspnetcore/issues/58297
- github.com/dotnet/aspnetcore/security/advisories/GHSA-7vw9-cfwx-9gx9
- learn.microsoft.com/en-us/aspnet/core/fundamentals/servers/kestrel/endpoints?view=aspnetcore-8.0
- learn.microsoft.com/en-us/aspnet/core/fundamentals/servers/kestrel/http3?view=aspnetcore-8.0
- msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38229
- nvd.nist.gov/vuln/detail/CVE-2024-38229
Detect and mitigate CVE-2024-38229 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →