ID

VAR-201905-1185


CVE

CVE-2019-0981


TITLE

Microsoft .NET Framework and .NET Core Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2019-003825

DESCRIPTION

A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests, aka '.Net Framework and .Net Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0820, CVE-2019-0980. This vulnerability CVE-2019-0820 and CVE-2019-0980 Is a different vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Both Microsoft .NET Core and Microsoft ASP.NET Core are products of Microsoft Corporation of the United States. .NET Core is a free open source development platform. The platform has features such as multi-language support and cross-platform. Microsoft ASP.NET Core is a cross-platform open source framework. The framework is used to build cloud-based applications such as web applications, IoT applications, and mobile backends. The vulnerability originates from improper design or implementation during code development of a network system or product. The following products and versions are affected: Microsoft .NET Framework version 4.7.2, version 4.7.1, version 4.6.2, version 4.6.1, version 3.5.1, version 4.8, version 4.7, version 4.6, version 4.5.2, Version 3.5, 3.0 SP2, 2.0 SP2; .NET Core 2.2, 2.1, 1.1, 1.0. An attacker can exploit this issue to cause a denial of service condition. Bug Fix(es): * dotnet: new SocketException((int)SocketError.InvalidArgument).Message is empty (BZ#1712471) 4. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix update Advisory ID: RHSA-2019:1236-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1236 Issue date: 2019-05-15 CVE Names: CVE-2019-0820 CVE-2019-0980 CVE-2019-0981 ==================================================================== 1. Summary: Updates for rh-dotnetcore10-dotnetcore, rh-dotnetcore11-dotnetcore, rh-dotnet21-dotnet, rh-dotnet22-dotnet and rh-dotnet22-curl are now available for .NET Core on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Security Fix(es): * dotNET: timeouts for regular expressions are not enforced (CVE-2019-0820) * dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of Service (CVE-2019-0980) * dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service (CVE-2019-0981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Bug Fix(es): * Re-enable bash completion in rh-dotnet22-dotnet (BZ#1654863) * Error rebuilding rh-dotnet22-curl in CentOS (BZ#1678932) * Broken apphost caused by unset DOTNET_ROOT (BZ#1703479) * Make bash completion compatible with rh-dotnet22 packages (BZ#1705259) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1654863 - Re-enable bash completion in rh-dotnet22-dotnet 1678932 - Error rebuilding rh-dotnet22-curl in CentOS 1703479 - Broken apphost caused by unset DOTNET_ROOT 1703508 - Update to .NET Core 1.1.13 1704454 - Update to .NET Core 1.0.16 1704934 - Update to .NET Core Runtime 2.2.5 and SDK 2.2.107 1705147 - Update to .NET Core Runtime 2.1.11 and SDK 2.1.507 1705259 - Make bash completion compatible with rh-dotnet22 packages 1705502 - CVE-2019-0980 dotNET: infinite loop in URI.TryCreate leading to ASP.Net Core Denial of Service 1705504 - CVE-2019-0981 dotNET: crash in IPAddress.TryCreate leading to ASP.Net Core Denial of Service 1705506 - CVE-2019-0820 dotNET: timeouts for regular expressions are not enforced 6. Package List: .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7): Source: rh-dotnet22-2.2-7.el7.src.rpm rh-dotnet22-curl-7.61.1-2.el7.src.rpm rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm x86_64: rh-dotnet22-2.2-7.el7.x86_64.rpm rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm x86_64: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm x86_64: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnet21-2.1-10.el7.src.rpm rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm x86_64: rh-dotnet21-2.1-10.el7.x86_64.rpm rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnet22-2.2-7.el7.src.rpm rh-dotnet22-curl-7.61.1-2.el7.src.rpm rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm x86_64: rh-dotnet22-2.2-7.el7.x86_64.rpm rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.src.rpm x86_64: rh-dotnetcore10-dotnetcore-1.0.16-1.el7.x86_64.rpm rh-dotnetcore10-dotnetcore-debuginfo-1.0.16-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.src.rpm x86_64: rh-dotnetcore11-dotnetcore-1.1.13-1.el7.x86_64.rpm rh-dotnetcore11-dotnetcore-debuginfo-1.1.13-1.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnet21-2.1-10.el7.src.rpm rh-dotnet21-dotnet-2.1.507-2.el7.src.rpm x86_64: rh-dotnet21-2.1-10.el7.x86_64.rpm rh-dotnet21-dotnet-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-debuginfo-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-host-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-runtime-2.1-2.1.11-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1-2.1.507-2.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.507-2.el7.x86_64.rpm rh-dotnet21-runtime-2.1-10.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnet22-2.2-7.el7.src.rpm rh-dotnet22-curl-7.61.1-2.el7.src.rpm rh-dotnet22-dotnet-2.2.107-2.el7.src.rpm x86_64: rh-dotnet22-2.2-7.el7.x86_64.rpm rh-dotnet22-curl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-curl-debuginfo-7.61.1-2.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.5-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.107-2.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.107-2.el7.x86_64.rpm rh-dotnet22-libcurl-7.61.1-2.el7.x86_64.rpm rh-dotnet22-libcurl-devel-7.61.1-2.el7.x86_64.rpm rh-dotnet22-runtime-2.2-7.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-0820 https://access.redhat.com/security/cve/CVE-2019-0980 https://access.redhat.com/security/cve/CVE-2019-0981 https://access.redhat.com/security/updates/classification/#moderate https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0820 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0980 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0981 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXNyKvtzjgjWX9erEAQiFIQ//RuDdkjwFrjsW69TloyogPym1x5uZp2eB hMR1l6l3YTE5ZIeCz7nn86P7IYtLAOiYj5ynjNbGT7aHrM7/R4REedYYqCFxWuu3 3N6vgg/ap1fB+0XdNX+PFNWm/orYRiVr6jyZs2hX4LSDLsQwHuOqVoDcApAHnggH kCRpaxlTEaG9/wyIY3Zvd7ZasxfVUfzhlpzpw25kq6OFJyIokWnVE8G+vs5KS3GQ pTir+3hMc3as8RQVCnWNZoeUhSUemZHvq5MyQqwLCeMFf6CvUTe04oDrMp7FUJHa UcImbcSzzrx3kBvFFmIv6D1uCetuRTrMaXBuOlZcpCJUcnHncvb1OvFhqAeGO6uN NqNnDyRUbyX2cHKpyYTUIfZsCsgKIOBHZNU911URlqnvHAu0LlgAOM0r1uXU48Wg z+LtgnFTDbRmFEspKpN98z4whSL8BnMR8VS/FmPfXo2ApFvipofCK+kPStU0lXZB n7xn4PJyKfst8xUkRfwJ09/GpN328i7QtH53aQG0HCQzKRhxswnc86aQnPW95RWP DPd4EAB74Bq1pEYqRN/gai6bhFsoCS0agf+M7lqBN8ZnQOScj5HD5hy8fsPvB1xD /I5I1sIOJ+Ar0FaCfZqFoXKncap0cp/bBJlHvfCpze4yISy7h6t2E/4l59Zs1xhm KCZo5tPFVoU=dJ6F -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 3.24

sources: NVD: CVE-2019-0981 // JVNDB: JVNDB-2019-003825 // CNVD: CNVD-2020-20377 // CNNVD: CNNVD-201905-395 // BID: 108207 // VULMON: CVE-2019-0981 // PACKETSTORM: 152999 // PACKETSTORM: 152953

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-20377

AFFECTED PRODUCTS

vendor:microsoftmodel:.net frameworkscope:eqversion:3.5

Trust: 3.3

vendor:microsoftmodel:.net frameworkscope:eqversion:4.5.2

Trust: 3.3

vendor:microsoftmodel:.net frameworkscope:eqversion:4.6.1

Trust: 3.3

vendor:microsoftmodel:.net frameworkscope:eqversion:3.5.1

Trust: 2.7

vendor:microsoftmodel:.net frameworkscope:eqversion:4.6

Trust: 2.7

vendor:microsoftmodel:.net frameworkscope:eqversion:4.6.2

Trust: 2.7

vendor:microsoftmodel:.net frameworkscope:eqversion:4.7

Trust: 2.7

vendor:microsoftmodel:.net corescope:eqversion:1.0

Trust: 2.7

vendor:microsoftmodel:.net corescope:eqversion:1.1

Trust: 2.7

vendor:microsoftmodel:.net frameworkscope:eqversion:4.7.1

Trust: 2.7

vendor:microsoftmodel:.net frameworkscope:eqversion:4.7.2

Trust: 2.7

vendor:microsoftmodel:.net frameworkscope:eqversion:4.8

Trust: 2.7

vendor:microsoftmodel:.net corescope:eqversion:2.2

Trust: 2.1

vendor:microsoftmodel:.net corescope:eqversion:2.1

Trust: 2.1

vendor:microsoftmodel:.net frameworkscope:eqversion:3.0

Trust: 1.0

vendor:microsoftmodel:.net frameworkscope:eqversion:2.0

Trust: 1.0

vendor:microsoftmodel:.net framework sp2scope:eqversion:3.0

Trust: 0.9

vendor:microsoftmodel:.net framework sp2scope:eqversion:2.0

Trust: 0.9

vendor:microsoftmodel:.net frameworkscope:eqversion:2.0 sp2

Trust: 0.8

vendor:microsoftmodel:.net frameworkscope:eqversion:3.0 sp2

Trust: 0.8

vendor:microsoftmodel:powershell corescope:eqversion:6.1

Trust: 0.8

vendor:microsoftmodel:powershell corescope:eqversion:6.2

Trust: 0.8

vendor:microsoftmodel:asp.net corescope:eqversion:2.1

Trust: 0.6

vendor:microsoftmodel:asp.net corescope:eqversion:2.2

Trust: 0.6

sources: CNVD: CNVD-2020-20377 // BID: 108207 // JVNDB: JVNDB-2019-003825 // NVD: CVE-2019-0981

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-0981
value: HIGH

Trust: 1.0

NVD: CVE-2019-0981
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-20377
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201905-395
value: HIGH

Trust: 0.6

VULMON: CVE-2019-0981
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-0981
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2020-20377
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-0981
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2020-20377 // VULMON: CVE-2019-0981 // JVNDB: JVNDB-2019-003825 // CNNVD: CNNVD-201905-395 // NVD: CVE-2019-0981

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.8

sources: JVNDB: JVNDB-2019-003825 // NVD: CVE-2019-0981

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201905-395

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201905-395

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003825

PATCH

title:CVE-2019-0981 | .Net Framework and .Net Core Denial of Service Vulnerabilityurl:https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0981

Trust: 0.8

title:CVE-2019-0981 | .NET Framework と .NET Core のサービス拒否の脆弱性url:https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2019-0981

Trust: 0.8

title:Patch for Microsoft .NET Core and Microsoft ASP.NET Core Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/211629

Trust: 0.6

title:Microsoft .NET Core and Microsoft ASP.NET Core Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92545

Trust: 0.6

title:Red Hat: Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191236 - Security Advisory

Trust: 0.1

title:Red Hat: Important: dotnet security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20191259 - Security Advisory

Trust: 0.1

title:sharpfuzzurl:https://github.com/Metalnem/sharpfuzz

Trust: 0.1

title:Symantec Threat Intelligence Blogurl:https://www.symantec.com/blogs/threat-intelligence/microsoft-patch-tuesday-may-2019

Trust: 0.1

sources: CNVD: CNVD-2020-20377 // VULMON: CVE-2019-0981 // JVNDB: JVNDB-2019-003825 // CNNVD: CNNVD-201905-395

EXTERNAL IDS

db:NVDid:CVE-2019-0981

Trust: 3.6

db:BIDid:108207

Trust: 1.0

db:JVNDBid:JVNDB-2019-003825

Trust: 0.8

db:PACKETSTORMid:152999

Trust: 0.7

db:PACKETSTORMid:152953

Trust: 0.7

db:CNVDid:CNVD-2020-20377

Trust: 0.6

db:AUSCERTid:ESB-2019.1839

Trust: 0.6

db:AUSCERTid:ESB-2019.1740

Trust: 0.6

db:CNNVDid:CNNVD-201905-395

Trust: 0.6

db:VULMONid:CVE-2019-0981

Trust: 0.1

sources: CNVD: CNVD-2020-20377 // VULMON: CVE-2019-0981 // BID: 108207 // JVNDB: JVNDB-2019-003825 // PACKETSTORM: 152999 // PACKETSTORM: 152953 // CNNVD: CNNVD-201905-395 // NVD: CVE-2019-0981

REFERENCES

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0981

Trust: 2.8

url:https://access.redhat.com/errata/rhsa-2019:1259

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2019-0981

Trust: 1.6

url:http://www.microsoft.com

Trust: 0.9

url:https://access.redhat.com/errata/rhsa-2019:1236

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0981

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20190515-ms.html

Trust: 0.8

url:http://www.jpcert.or.jp/at/2019/at190023.html

Trust: 0.8

url:https://www.securityfocus.com/bid/108207

Trust: 0.7

url:https://packetstormsecurity.com/files/152999/red-hat-security-advisory-2019-1259-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/81042

Trust: 0.6

url:https://packetstormsecurity.com/files/152953/red-hat-security-advisory-2019-1236-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1839/

Trust: 0.6

url:https://vigilance.fr/vulnerability/microsoft-net-vulnerabilities-of-may-2019-29296

Trust: 0.6

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0820

Trust: 0.2

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0980

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-0980

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-0820

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-0981

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2019-0980

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2019-0820

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/19.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/metalnem/sharpfuzz

Trust: 0.1

url:https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/108207

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2019-0757

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2019-0757

Trust: 0.1

url:https://github.com/dotnet/core/blob/master/release-notes/2.1/2.1.11/2.1.11.md

Trust: 0.1

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-0757

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.1

sources: CNVD: CNVD-2020-20377 // VULMON: CVE-2019-0981 // BID: 108207 // JVNDB: JVNDB-2019-003825 // PACKETSTORM: 152999 // PACKETSTORM: 152953 // CNNVD: CNNVD-201905-395 // NVD: CVE-2019-0981

CREDITS

Nemanja Mijailovic,Red Hat

Trust: 0.6

sources: CNNVD: CNNVD-201905-395

SOURCES

db:CNVDid:CNVD-2020-20377
db:VULMONid:CVE-2019-0981
db:BIDid:108207
db:JVNDBid:JVNDB-2019-003825
db:PACKETSTORMid:152999
db:PACKETSTORMid:152953
db:CNNVDid:CNNVD-201905-395
db:NVDid:CVE-2019-0981

LAST UPDATE DATE

2024-08-14T13:26:22.092000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-20377date:2020-03-31T00:00:00
db:VULMONid:CVE-2019-0981date:2019-05-22T00:00:00
db:BIDid:108207date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2019-003825date:2019-05-23T00:00:00
db:CNNVDid:CNNVD-201905-395date:2019-05-24T00:00:00
db:NVDid:CVE-2019-0981date:2019-05-22T13:29:01.083

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-20377date:2020-03-31T00:00:00
db:VULMONid:CVE-2019-0981date:2019-05-16T00:00:00
db:BIDid:108207date:2019-05-14T00:00:00
db:JVNDBid:JVNDB-2019-003825date:2019-05-23T00:00:00
db:PACKETSTORMid:152999date:2019-05-22T14:39:27
db:PACKETSTORMid:152953date:2019-05-16T23:05:23
db:CNNVDid:CNNVD-201905-395date:2019-05-14T00:00:00
db:NVDid:CVE-2019-0981date:2019-05-16T19:29:05.020