ID

VAR-201909-0497


CVE

CVE-2019-1301


TITLE

.NET Core and PowerShell Core Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2019-009187

DESCRIPTION

A denial of service vulnerability exists when .NET Core improperly handles web requests, aka '.NET Core Denial of Service Vulnerability'. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: .NET Core on Red Hat Enterprise Linux security and bug fix update Advisory ID: RHSA-2019:2732-01 Product: .NET Core on Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:2732 Issue date: 2019-09-11 CVE Names: CVE-2019-1301 ==================================================================== 1. Summary: An update for rh-dotnet21-dotnet and rh-dotnet22-dotnet is now available for .NET Core on Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64 .NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64 3. It implements a subset of the .NET framework APIs and several new APIs, and it includes a CLR implementation. Security Fix(es): * dotnet: System.Net.Sockets.dll Socket.ConnectAsync Denial of Service (CVE-2019-1301) Default inclusions for applications built with .NET Core have been updated to reference the newest versions and their security fixes. For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1750793 - CVE-2019-1301 dotnet: System.Net.Sockets.dll Socket.ConnectAsync Denial of Service 6. Package List: .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7): Source: rh-dotnet21-2.1-12.el7.src.rpm rh-dotnet21-dotnet-2.1.509-1.el7.src.rpm x86_64: rh-dotnet21-2.1-12.el7.x86_64.rpm rh-dotnet21-dotnet-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-debuginfo-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-host-2.1.13-1.el7.x86_64.rpm rh-dotnet21-dotnet-runtime-2.1-2.1.13-1.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.509-1.el7.x86_64.rpm rh-dotnet21-runtime-2.1-12.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux ComputeNode (v. 7): Source: rh-dotnet22-2.2-9.el7.src.rpm rh-dotnet22-dotnet-2.2.109-1.el7.src.rpm x86_64: rh-dotnet22-2.2-9.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.109-1.el7.x86_64.rpm rh-dotnet22-runtime-2.2-9.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnet21-2.1-12.el7.src.rpm rh-dotnet21-dotnet-2.1.509-1.el7.src.rpm x86_64: rh-dotnet21-2.1-12.el7.x86_64.rpm rh-dotnet21-dotnet-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-debuginfo-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-host-2.1.13-1.el7.x86_64.rpm rh-dotnet21-dotnet-runtime-2.1-2.1.13-1.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.509-1.el7.x86_64.rpm rh-dotnet21-runtime-2.1-12.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Server (v. 7): Source: rh-dotnet22-2.2-9.el7.src.rpm rh-dotnet22-dotnet-2.2.109-1.el7.src.rpm x86_64: rh-dotnet22-2.2-9.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.109-1.el7.x86_64.rpm rh-dotnet22-runtime-2.2-9.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnet21-2.1-12.el7.src.rpm rh-dotnet21-dotnet-2.1.509-1.el7.src.rpm x86_64: rh-dotnet21-2.1-12.el7.x86_64.rpm rh-dotnet21-dotnet-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-debuginfo-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-host-2.1.13-1.el7.x86_64.rpm rh-dotnet21-dotnet-runtime-2.1-2.1.13-1.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1-2.1.509-1.el7.x86_64.rpm rh-dotnet21-dotnet-sdk-2.1.5xx-2.1.509-1.el7.x86_64.rpm rh-dotnet21-runtime-2.1-12.el7.x86_64.rpm .NET Core on Red Hat Enterprise Linux Workstation (v. 7): Source: rh-dotnet22-2.2-9.el7.src.rpm rh-dotnet22-dotnet-2.2.109-1.el7.src.rpm x86_64: rh-dotnet22-2.2-9.el7.x86_64.rpm rh-dotnet22-dotnet-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-debuginfo-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-host-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-host-fxr-2.2-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-runtime-2.2-2.2.7-1.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2-2.2.109-1.el7.x86_64.rpm rh-dotnet22-dotnet-sdk-2.2.1xx-2.2.109-1.el7.x86_64.rpm rh-dotnet22-runtime-2.2-9.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2019-1301 https://access.redhat.com/security/updates/classification/#moderate 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBXXjwE9zjgjWX9erEAQh4+g/+IzAqdtB4ZLUCETa7mQF2dBTDwmedG4TN fcU7Cd0UpbfHs0fTImFN14ZGt+/d4JLSJ0f4yCoXHBVABRkhb/c3XQrfJvundSqP WJdzZ7ITstBE2bxUyLglAgg7dkea0fFsub0WwoYrPCad+ggZznyVoSX0c44W6SR7 U9JVRV6pose3ceECtmFkgBQPcsUJKhYebeNe/xNEBPaSIJsbt/nu63WcnVoQRv9z HJCesQs6DW85QHd9+muvPq27keOvxe3v7ltusVPlvjw/vxVTkHwTDKLl2sWKXbkv k9E8Wiy7MucyRJo/Suc+xW+5mKsMEOQeSiBN/6WAGRnb5fVrUYjo9qtpq/INM8bP 3obkR5svSAPE46DLpnjuNVtiq8m9hrnDTwrxqeURDVC3GLFmskGAp3dWyXIefsuK pVSjgRGiqvJa1C8XZSvbihd5yLCp/0j8yvD8o4beEZyCnfql7T+fkXUE1vNgnNQL RWup6jVPyOK0nMUcob0wImClrmZ2qV/YwrTMvXObQwrQvLx2PblVAk4fX0Ts1Jtv poV6RYyTK5EOS4VgShYkVdGx+drlNNYyNnk3t0mm/Adr5p2H93ZN9wrttTB3qw+C WbtKSOCLJTM4mg3BE9YlyiJnqlXsATIdjfWtctqS8KK7x1HmJKT0hTW+S7IuuXSV RMiic1TBPqQ=HlAt -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.8

sources: NVD: CVE-2019-1301 // JVNDB: JVNDB-2019-009187 // PACKETSTORM: 154454 // PACKETSTORM: 154453

AFFECTED PRODUCTS

vendor:microsoftmodel:.net corescope:eqversion:2.1

Trust: 1.8

vendor:microsoftmodel:.net corescope:eqversion:2.2

Trust: 1.8

vendor:microsoftmodel:powershell corescope:eqversion:6.1

Trust: 1.8

vendor:microsoftmodel:powershell corescope:eqversion:6.2

Trust: 1.8

sources: JVNDB: JVNDB-2019-009187 // NVD: CVE-2019-1301

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1301
value: HIGH

Trust: 1.0

NVD: CVE-2019-1301
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201909-469
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-1301
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

nvd@nist.gov: CVE-2019-1301
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2019-1301
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2019-009187 // CNNVD: CNNVD-201909-469 // NVD: CVE-2019-1301

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-20

Trust: 0.8

sources: JVNDB: JVNDB-2019-009187 // NVD: CVE-2019-1301

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201909-469

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201909-469

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-009187

PATCH

title:CVE-2019-1301 | .NET Core Denial of Service Vulnerabilityurl:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2019-1301

Trust: 0.8

title:CVE-2019-1301 | .NET Core のサービス拒否の脆弱性url:https://portal.msrc.microsoft.com/ja-jp/security-guidance/advisory/CVE-2019-1301

Trust: 0.8

title:Microsoft .NET Core Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=98058

Trust: 0.6

sources: JVNDB: JVNDB-2019-009187 // CNNVD: CNNVD-201909-469

EXTERNAL IDS

db:NVDid:CVE-2019-1301

Trust: 2.6

db:JVNDBid:JVNDB-2019-009187

Trust: 0.8

db:PACKETSTORMid:154454

Trust: 0.7

db:AUSCERTid:ESB-2019.3462

Trust: 0.6

db:CNNVDid:CNNVD-201909-469

Trust: 0.6

db:PACKETSTORMid:154453

Trust: 0.1

sources: JVNDB: JVNDB-2019-009187 // PACKETSTORM: 154454 // PACKETSTORM: 154453 // CNNVD: CNNVD-201909-469 // NVD: CVE-2019-1301

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-1301

Trust: 1.6

url:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/cve-2019-1301

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1301

Trust: 0.8

url:https://www.ipa.go.jp/security/ciadr/vul/20190911-ms.html

Trust: 0.8

url:https://www.jpcert.or.jp/at/2019/at190036.html

Trust: 0.8

url:https://access.redhat.com/security/cve/cve-2019-1301

Trust: 0.8

url:https://packetstormsecurity.com/files/154454/red-hat-security-advisory-2019-2732-01.html

Trust: 0.6

url:https://portal.msrc.microsoft.com/zh-cn/security-guidance/advisory/cve-2019-1301

Trust: 0.6

url:https://vigilance.fr/vulnerability/microsoft-net-core-vulnerabilities-of-september-2019-30306

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.3462/

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.2

url:https://bugzilla.redhat.com/):

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/team/contact/

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2019:2732

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2019:2731

Trust: 0.1

sources: JVNDB: JVNDB-2019-009187 // PACKETSTORM: 154454 // PACKETSTORM: 154453 // CNNVD: CNNVD-201909-469 // NVD: CVE-2019-1301

CREDITS

Red Hat,Paul Ryman of VMware Sydney Engineering Team

Trust: 0.6

sources: CNNVD: CNNVD-201909-469

SOURCES

db:JVNDBid:JVNDB-2019-009187
db:PACKETSTORMid:154454
db:PACKETSTORMid:154453
db:CNNVDid:CNNVD-201909-469
db:NVDid:CVE-2019-1301

LAST UPDATE DATE

2024-08-14T14:12:12.482000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2019-009187date:2019-09-13T00:00:00
db:CNNVDid:CNNVD-201909-469date:2020-08-25T00:00:00
db:NVDid:CVE-2019-1301date:2020-08-24T17:37:01.140

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2019-009187date:2019-09-13T00:00:00
db:PACKETSTORMid:154454date:2019-09-11T14:02:08
db:PACKETSTORMid:154453date:2019-09-11T14:02:01
db:CNNVDid:CNNVD-201909-469date:2019-09-10T00:00:00
db:NVDid:CVE-2019-1301date:2019-09-11T22:15:19.023