Security Update for .NET Core (November 2018)

medium Nessus Plugin ID 118979

Synopsis

The remote Windows host is affected by a .NET Core tampering vulnerability.

Description

The remote Windows host has an installation of .NET Core with a version of 2.1.x. Therefore, the host is affected by a tampering vulnerability which exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain limited locations on a vulnerable system.

Solution

Refer to vendor documentation.

See Also

https://github.com/dotnet/corefx/pull/32127

http://www.nessus.org/u?fe37e3a1

Plugin Details

Severity: Medium

ID: 118979

File Name: smb_nt_ms18_nov_dotnet_core.nasl

Version: 1.4

Type: local

Agent: windows

Family: Windows

Published: 11/16/2018

Updated: 11/1/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2018-8416

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:microsoft:.net_core

Required KB Items: Settings/ParanoidReport, installed_sw/.NET Core Windows

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 11/13/2018

Reference Information

CVE: CVE-2018-8416

BID: 105798