Security and Quality Rollup for .NET Framework (January 2018)
High Nessus Plugin ID 105731
SynopsisThe remote Windows host has a software framework installed that is affected by multiple vulnerabilities.
DescriptionThe .NET Framework installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerabilities:
- A Denial of Service vulnerability exists when .NET, and .NET core, improperly process XML documents. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to a .NET(or .NET core) application. (CVE-2018-0764)
- A security feature bypass vulnerability exists when Microsoft .NET Framework (and .NET Core) components do not completely validate certificates. An attacker could present a certificate that is marked invalid for a specific use, but the component uses it for that purpose. This action disregards the Enhanced Key Usage taggings. (CVE-2018-0786)
SolutionMicrosoft has released a set of patches for Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1