Описание Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
Важность: HIGH (7,5) Вектор: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Опубликовано: 10 января 2018 г.
Изменено: 12 августа 2021 г.
Идентификатор типа ошибки: CWE-295 Исправленные пакеты Ссылки на рекомендации, решения и инструменты Подверженные конфигурации: cpe:2.3:a:microsoft:.net_core:2.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_core:1.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:powershell_core:6.0:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*
cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*
Running on/with:
cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*