Microsoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A denial of service vulnerability exists in ASP.NET Core 3.1 and .NET 6.0 where a malicious client could cause a stack overflow which may result in a denial of service attack when an attacker sends a customized payload that is parsed during model binding.
Affected software
- Any .NET 6.0 application running on .NET 6.0.8 or earlier.
- Any ASP.NET Core 3.1 application running on .NET Core 3.1.28 or earlier.
If your application uses the following package versions, ensure you update to the latest version of .NET.
.NET Core 3.1
Package name |
Affected version |
Patched version |
Microsoft.AspNetCore.App.Runtime.linux-arm |
>= 3.1.0, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.linux-arm64 |
>= 3.1.0, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 |
>= 3.1.0, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64 |
>= 3.1.0, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.linux-x64 |
>= 3.1.0, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.osx-x64 |
>= 3.1.0, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.win-arm |
>= 3.1.0, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.win-arm64 |
>= 3.1.5, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.win-x64 |
>= 3.1.0, < 3.1.29 |
3.1.29 |
Microsoft.AspNetCore.App.Runtime.win-x86 |
>= 3.1.0, < 3.1.29 |
3.1.29 |
.NET 6
Package name |
Affected version |
Patched version |
Microsoft.AspNetCore.App.Runtime.linux-arm |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.linux-arm64 |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm |
>= 5.0.1, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.linux-musl-arm64 |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.linux-musl-x64 |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.linux-x64 |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.osx-arm64 |
>= 6.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.osx-x64 |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.win-arm |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.win-arm64 |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.win-x64 |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Microsoft.AspNetCore.App.Runtime.win-x86 |
>= 5.0.0, < 6.0.9 |
6.0.9 |
Other
Announcement for this issue can be found at dotnet/announcements#234
An Issue for this can be found at #43953
MSRC details for this can be found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A denial of service vulnerability exists in ASP.NET Core 3.1 and .NET 6.0 where a malicious client could cause a stack overflow which may result in a denial of service attack when an attacker sends a customized payload that is parsed during model binding.
Affected software
If your application uses the following package versions, ensure you update to the latest version of .NET.
.NET Core 3.1
.NET 6
Other
Announcement for this issue can be found at dotnet/announcements#234
An Issue for this can be found at #43953
MSRC details for this can be found at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38013