.NET Denial of Service Vulnerability
Description
.NET Denial of Service Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A denial of service vulnerability in .NET 6.0 allows a malicious client to cause a stack overflow via invalid requests, leading to service disruption.
Vulnerability
CVE-2023-21538 is a denial of service vulnerability in .NET 6.0 that arises when a malicious client sends an invalid request to an exposed endpoint, causing a stack overflow. The root cause lies in improper handling of such requests in the runtime, leading to uncontrolled recursion or excessive stack consumption [1].
Exploitation
An attacker can exploit this vulnerability remotely over a network without any authentication. By sending a specially crafted invalid request to a vulnerable .NET 6.0 application, the attacker triggers a stack overflow, which crashes the process. The attack requires only network access to an endpoint that accepts requests [1].
Impact
Successful exploitation results in a denial of service, rendering the application unavailable. This can disrupt services and potentially impact business operations. No other impacts, such as data breach or privilege escalation, have been identified [1][3].
Mitigation
Microsoft has released a security update for .NET 6.0 (version 6.0.13) that addresses this vulnerability. All affected packages listed in the advisory should be updated. No mitigating factors or workarounds are available [1][3].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.NETCore.App.Runtime.linux-armNuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.linux-arm64NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.linux-musl-armNuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.linux-musl-arm64NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.linux-musl-x64NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.linux-x64NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.osx-arm64NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.osx-x64NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.win-armNuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.win-arm64NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.win-x64NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Microsoft.NETCore.App.Runtime.win-x86NuGet | >= 6.0.0, < 6.0.13 | 6.0.13 |
Affected products
26- osv-coords24 versionspkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:bitnami/powershellpkg:nuget/microsoft.netcore.app.runtime.linux-armpkg:nuget/microsoft.netcore.app.runtime.linux-arm64pkg:nuget/microsoft.netcore.app.runtime.linux-musl-armpkg:nuget/microsoft.netcore.app.runtime.linux-musl-arm64pkg:nuget/microsoft.netcore.app.runtime.linux-musl-x64pkg:nuget/microsoft.netcore.app.runtime.linux-x64pkg:nuget/microsoft.netcore.app.runtime.osx-arm64pkg:nuget/microsoft.netcore.app.runtime.osx-x64pkg:nuget/microsoft.netcore.app.runtime.win-armpkg:nuget/microsoft.netcore.app.runtime.win-arm64pkg:nuget/microsoft.netcore.app.runtime.win-x64pkg:nuget/microsoft.netcore.app.runtime.win-x86pkg:rpm/almalinux/aspnetcore-runtime-6.0pkg:rpm/almalinux/aspnetcore-targeting-pack-6.0pkg:rpm/almalinux/dotnet-apphost-pack-6.0pkg:rpm/almalinux/dotnet-hostfxr-6.0pkg:rpm/almalinux/dotnet-runtime-6.0pkg:rpm/almalinux/dotnet-sdk-6.0pkg:rpm/almalinux/dotnet-sdk-6.0-source-built-artifactspkg:rpm/almalinux/dotnet-targeting-pack-6.0pkg:rpm/almalinux/dotnet-templates-6.0
>= 6.0.0, < 6.0.1+ 23 more
- (no CPE)range: >= 6.0.0, < 6.0.1
- (no CPE)range: >= 6.0.0, < 6.0.1
- (no CPE)range: >= 7.2.0, <= 7.2.0
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: >= 6.0.0, < 6.0.13
- (no CPE)range: < 6.0.13-1.el9_1
- (no CPE)range: < 6.0.13-1.el9_1
- (no CPE)range: < 6.0.13-1.el9_1
- (no CPE)range: < 6.0.13-1.el9_1
- (no CPE)range: < 6.0.13-1.el9_1
- (no CPE)range: < 6.0.113-1.el9_1
- (no CPE)range: < 6.0.113-1.el9_1
- (no CPE)range: < 6.0.13-1.el9_1
- (no CPE)range: < 6.0.113-1.el9_1
- Microsoft/.NET 6.0v5Range: 6.0.0
- Microsoft/PowerShell 7.2v5Range: 7.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-8f7f-vqg5-jrv9ghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21538ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-21538ghsaADVISORY
- github.com/dotnet/runtime/security/advisories/GHSA-8f7f-vqg5-jrv9ghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GV5QDWYJ4C26JB7RTI55Z4O76WSH4FMVghsaWEB
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZI27LYW5C4Z4644WYIQWOXBZL7WIP2X6ghsaWEB
- portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2023-21538ghsaWEB
News mentions
0No linked articles in our index yet.