cvelist/2020/1xxx/CVE-2020-1597.json

134 lines
6.2 KiB
JSON
Raw Normal View History

2020-08-17 11:56:03 -07:00
{
2024-01-04 02:01:19 +00:00
"data_version": "4.0",
2020-08-17 20:02:38 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2020-1597",
2024-01-04 02:01:19 +00:00
"ASSIGNER": "secure@microsoft.com",
2020-08-17 20:02:38 +00:00
"STATE": "PUBLIC"
},
2024-01-04 02:01:19 +00:00
"description": {
"description_data": [
{
"lang": "eng",
"value": "<p>A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.</p>\n<p>A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the ASP.NET Core application.</p>\n<p>The update addresses the vulnerability by correcting how the ASP.NET Core web application handles web requests.</p>\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
2020-08-17 20:02:38 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2024-01-04 02:01:19 +00:00
"vendor_name": "Microsoft",
2020-08-17 20:02:38 +00:00
"product": {
"product_data": [
{
"product_name": "ASP.NET Core 2.1",
"version": {
"version_data": [
{
2024-01-04 02:01:19 +00:00
"version_affected": "<",
"version_name": "2.0",
"version_value": "publication"
2020-08-17 20:02:38 +00:00
}
]
}
},
{
"product_name": "ASP.NET Core 3.1",
"version": {
"version_data": [
{
2024-01-04 02:01:19 +00:00
"version_affected": "<",
"version_name": "3.0",
"version_value": "publication"
2020-08-17 20:02:38 +00:00
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3)",
"version": {
"version_data": [
{
2024-01-04 02:01:19 +00:00
"version_affected": "<",
"version_name": "16.0",
"version_value": "publication"
2020-08-17 20:02:38 +00:00
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2017 version 15.9 (includes 15.0 - 15.8)",
"version": {
"version_data": [
{
2024-01-04 02:01:19 +00:00
"version_affected": "<",
"version_name": "15.9.0",
"version_value": "publication"
2020-08-17 20:02:38 +00:00
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2019 version 16.0",
"version": {
"version_data": [
{
2024-01-04 02:01:19 +00:00
"version_affected": "<",
"version_name": "16.0",
"version_value": "publication"
2020-08-17 20:02:38 +00:00
}
]
}
},
{
2024-01-04 02:01:19 +00:00
"product_name": "Microsoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6)",
2020-08-17 20:02:38 +00:00
"version": {
"version_data": [
{
2024-01-04 02:01:19 +00:00
"version_affected": "<",
"version_name": "16.0.0",
"version_value": "publication"
2020-08-17 20:02:38 +00:00
}
]
}
}
]
2024-01-04 02:01:19 +00:00
}
2020-08-17 11:56:03 -07:00
}
]
}
2020-08-17 20:02:38 +00:00
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1597",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1597"
2020-09-12 18:01:30 +00:00
},
{
2024-01-04 02:01:19 +00:00
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZW4CBI26KSO3PRL3HLVVISXPPOYUHSXO/"
2020-09-25 20:01:35 +00:00
},
{
2024-01-04 02:01:19 +00:00
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT/",
"refsource": "MISC",
"name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WH5FQ5VT3JGHXFXOETHCTBWJUIAPGHHT/"
2020-08-17 20:02:38 +00:00
}
]
}
}