.NET Core and Visual Studio Denial of Service Vulnerability
Description
.NET Core and Visual Studio Denial of Service Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A denial of service vulnerability exists in .NET Core when processing specially crafted X.509 certificates on Linux systems.
Root
Cause
CVE-2023-36799 is a Denial of Service (DoS) vulnerability in .NET Core and Visual Studio, specifically affecting the processing of X.509 certificates on Linux systems [1]. The flaw resides in how the .NET runtime handles malformed certificate data, potentially leading to excessive resource consumption when a maliciously crafted certificate is parsed.
Attack
Vector
An attacker can exploit this vulnerability by providing a specially crafted X.509 certificate to an application built on an affected .NET version [1]. The attack requires no prior authentication and can be delivered through any channel where the application ingests certificate data (e.g., TLS connections, certificate validation routines). The vulnerability is exclusive to Linux environments; Windows and macOS systems are not affected [1].
Impact
Successful exploitation results in a denial of service condition, where the application becomes unresponsive or crashes, disrupting availability. This is a network-based attack that can be launched remotely without user interaction, making it especially dangerous for internet-facing services that accept certificate data [1].
Mitigation
Microsoft has released security updates to address this vulnerability. .NET 7.0 applications running versions 7.0.10 or earlier must update to .NET 7.0.11 or later, while .NET 6.0 applications on versions 6.0.21 or earlier need to update to .NET 6.0.22 or later [1]. Additionally, the affected runtime packages (e.g., Microsoft.NETCore.App.Runtime.linux-x64) have corresponding patched versions. No workarounds or mitigating factors are available; applying the latest patches is the only remediation [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.NETCore.App.Runtime.linux-arm64NuGet | >= 7.0.0, < 7.0.11 | 7.0.11 |
Microsoft.NETCore.App.Runtime.linux-musl-arm64NuGet | >= 7.0.0, < 7.0.11 | 7.0.11 |
Microsoft.NETCore.App.Runtime.linux-armNuGet | >= 7.0.0, < 7.0.11 | 7.0.11 |
Microsoft.NETCore.App.Runtime.linux-musl-armNuGet | >= 7.0.0, < 7.0.11 | 7.0.11 |
Microsoft.NETCore.App.Runtime.linux-musl-x64NuGet | >= 7.0.0, < 7.0.11 | 7.0.11 |
Microsoft.NETCore.App.Runtime.linux-x64NuGet | >= 7.0.0, < 7.0.11 | 7.0.11 |
Microsoft.NETCore.App.Runtime.linux-x64NuGet | >= 6.0.0, < 6.0.22 | 6.0.22 |
Microsoft.NETCore.App.Runtime.linux-musl-x64NuGet | >= 6.0.0, < 6.0.22 | 6.0.22 |
Microsoft.NETCore.App.Runtime.linux-musl-armNuGet | >= 6.0.0, < 6.0.22 | 6.0.22 |
Microsoft.NETCore.App.Runtime.linux-armNuGet | >= 6.0.0, < 6.0.22 | 6.0.22 |
Microsoft.NETCore.App.Runtime.linux-arm64NuGet | >= 6.0.0, < 6.0.22 | 6.0.22 |
Microsoft.NETCore.App.Runtime.linux-musl-arm64NuGet | >= 6.0.0, < 6.0.22 | 6.0.22 |
Affected products
41- osv-coords33 versionspkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:deb/ubuntu/dotnet6@6.0.123-0ubuntu1?arch=source&distro=manticpkg:deb/ubuntu/dotnet6@6.0.124-0ubuntu1~23.10.1?arch=source&distro=manticpkg:deb/ubuntu/dotnet7@7.0.112-0ubuntu1?arch=source&distro=manticpkg:deb/ubuntu/dotnet7@7.0.113-0ubuntu1~23.10.1?arch=source&distro=manticpkg:nuget/microsoft.netcore.app.runtime.linux-armpkg:nuget/microsoft.netcore.app.runtime.linux-arm64pkg:nuget/microsoft.netcore.app.runtime.linux-musl-armpkg:nuget/microsoft.netcore.app.runtime.linux-musl-arm64pkg:nuget/microsoft.netcore.app.runtime.linux-musl-x64pkg:nuget/microsoft.netcore.app.runtime.linux-x64pkg:rpm/almalinux/aspnetcore-runtime-6.0pkg:rpm/almalinux/aspnetcore-runtime-7.0pkg:rpm/almalinux/aspnetcore-targeting-pack-6.0pkg:rpm/almalinux/aspnetcore-targeting-pack-7.0pkg:rpm/almalinux/dotnetpkg:rpm/almalinux/dotnet-apphost-pack-6.0pkg:rpm/almalinux/dotnet-apphost-pack-7.0pkg:rpm/almalinux/dotnet-hostpkg:rpm/almalinux/dotnet-hostfxr-6.0pkg:rpm/almalinux/dotnet-hostfxr-7.0pkg:rpm/almalinux/dotnet-runtime-6.0pkg:rpm/almalinux/dotnet-runtime-7.0pkg:rpm/almalinux/dotnet-sdk-6.0pkg:rpm/almalinux/dotnet-sdk-6.0-source-built-artifactspkg:rpm/almalinux/dotnet-sdk-7.0pkg:rpm/almalinux/dotnet-sdk-7.0-source-built-artifactspkg:rpm/almalinux/dotnet-targeting-pack-6.0pkg:rpm/almalinux/dotnet-targeting-pack-7.0pkg:rpm/almalinux/dotnet-templates-6.0pkg:rpm/almalinux/dotnet-templates-7.0pkg:rpm/almalinux/netstandard-targeting-pack-2.1
>= 6.0.0, < 6.0.1+ 32 more
- (no CPE)range: >= 6.0.0, < 6.0.1
- (no CPE)range: >= 6.0.0, < 6.0.1
- (no CPE)range: < 6.0.123-0ubuntu1
- (no CPE)range: < 6.0.124-0ubuntu1~23.10.1
- (no CPE)range: < 7.0.112-0ubuntu1
- (no CPE)range: < 7.0.113-0ubuntu1~23.10.1
- (no CPE)range: >= 7.0.0, < 7.0.11
- (no CPE)range: >= 7.0.0, < 7.0.11
- (no CPE)range: >= 7.0.0, < 7.0.11
- (no CPE)range: >= 7.0.0, < 7.0.11
- (no CPE)range: >= 7.0.0, < 7.0.11
- (no CPE)range: >= 7.0.0, < 7.0.11
- (no CPE)range: < 6.0.22-1.el9_2
- (no CPE)range: < 7.0.11-1.el8_8
- (no CPE)range: < 6.0.22-1.el9_2
- (no CPE)range: < 7.0.11-1.el8_8
- (no CPE)range: < 7.0.111-1.el8_8
- (no CPE)range: < 6.0.22-1.el9_2
- (no CPE)range: < 7.0.11-1.el8_8
- (no CPE)range: < 7.0.11-1.el8_8
- (no CPE)range: < 6.0.22-1.el9_2
- (no CPE)range: < 7.0.11-1.el8_8
- (no CPE)range: < 6.0.22-1.el9_2
- (no CPE)range: < 7.0.11-1.el8_8
- (no CPE)range: < 6.0.122-1.el9_2
- (no CPE)range: < 6.0.122-1.el9_2
- (no CPE)range: < 7.0.111-1.el8_8
- (no CPE)range: < 7.0.111-1.el8_8
- (no CPE)range: < 6.0.22-1.el9_2
- (no CPE)range: < 7.0.11-1.el8_8
- (no CPE)range: < 6.0.122-1.el9_2
- (no CPE)range: < 7.0.111-1.el8_8
- (no CPE)range: < 7.0.111-1.el8_8
- Microsoft/Microsoft Visual Studio 2022 version 17.2v5Range: 17.2.0
- Microsoft/Microsoft Visual Studio 2022 version 17.4v5Range: 17.4.0
- Microsoft/Microsoft Visual Studio 2022 version 17.6v5Range: 17.6.0
- Microsoft/Microsoft Visual Studio 2022 version 17.7v5Range: 17.7.0
- Microsoft/.NET 6.0v5Range: 6.0.0
- Microsoft/.NET 7.0v5Range: 7.0.0
- Microsoft/PowerShell 7.2v5Range: 7.2.0
- Microsoft/PowerShell 7.3v5Range: 7.3.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-h3hv-63q5-jgprghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36799ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2023-36799ghsaADVISORY
- github.com/dotnet/runtime/security/advisories/GHSA-h3hv-63q5-jgprghsaWEB
News mentions
0No linked articles in our index yet.