.NET and Visual Studio Denial of Service Vulnerability
Description
.NET and Visual Studio Denial of Service Vulnerability
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2024-38095 is a denial-of-service vulnerability in .NET's X.509 certificate parsing (System.Formats.Asn1) affecting versions 6.0 and 8.0, patched in July 2024.
Vulnerability
Overview
CVE-2024-38095 is a denial-of-service vulnerability that exists when .NET's System.Formats.Asn1 component parses an X.509 certificate or collection of certificates [1]. A specially crafted malicious certificate can cause excessive CPU consumption on any platform, leading to a denial of service [1]. The vulnerability affects .NET 6.0 applications running version 6.0.31 or earlier, and .NET 8.0 applications running version 8.0.6 or earlier [1].
Exploitation
Conditions
The vulnerability is triggered when an application using the affected .NET runtime parses a malicious X.509 certificate [1]. No special authentication or network position is required, as the attacker only needs to provide a crafted certificate to a parsing endpoint. Microsoft has not identified any mitigating factors for this vulnerability [1].
Impact
Successful exploitation results in excessive CPU consumption, leading to a denial of service on the target system [1][2]. The vulnerability can be exploited on all supported platforms, and the CPU exhaustion can potentially impact the availability of the affected application or system [1].
Mitigation
Microsoft has released patches for the vulnerability [1]. .NET 6.0 should be updated to version 6.0.32 or later, and .NET 8.0 should be updated to version 8.0.7 or later [1]. The corresponding runtime packages (e.g., Microsoft.NetCore.App.Runtime.*) and the System.Formats.Asn1 package have been patched [1]. Users are advised to apply the updates through standard update channels. There are no workarounds available [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Microsoft.NetCore.App.Runtime.linux-armNuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.linux-armNuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.linux-arm64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.linux-arm64NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.linux-musl-armNuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.linux-musl-armNuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.linux-musl-arm64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.linux-musl-arm64NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.linux-musl-x64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.linux-musl-x64NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.linux-x64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.linux-x64NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.osx-arm64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.osx-arm64NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.osx-x64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.osx-x64NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.win-armNuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.win-arm64NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
Microsoft.NetCore.App.Runtime.win-x64NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 6.0.0, < 6.0.32 | 6.0.32 |
Microsoft.NetCore.App.Runtime.win-x86NuGet | >= 8.0.0, < 8.0.7 | 8.0.7 |
System.Formats.Asn1NuGet | >= 5.0.0-preview.7.20364.11, < 6.0.1 | 6.0.1 |
System.Formats.Asn1NuGet | >= 7.0.0-preview.1.22076.8, < 8.0.1 | 8.0.1 |
Affected products
69- osv-coords61 versionspkg:apk/chainguard/aspnet-8-runtimepkg:apk/chainguard/aspnet-8-runtime-defaultpkg:apk/chainguard/aspnet-8-targeting-packpkg:apk/chainguard/dotnet-8pkg:apk/chainguard/dotnet-8-runtimepkg:apk/chainguard/dotnet-8-runtime-defaultpkg:apk/chainguard/dotnet-8-sdkpkg:apk/chainguard/dotnet-8-sdk-defaultpkg:apk/chainguard/dotnet-8-targeting-packpkg:apk/chainguard/dotnet-bootstrap-8pkg:apk/chainguard/netstandard-8-targeting-packpkg:apk/wolfi/aspnet-8-runtimepkg:apk/wolfi/aspnet-8-runtime-defaultpkg:apk/wolfi/aspnet-8-targeting-packpkg:apk/wolfi/dotnet-8pkg:apk/wolfi/dotnet-8-runtimepkg:apk/wolfi/dotnet-8-runtime-defaultpkg:apk/wolfi/dotnet-8-sdkpkg:apk/wolfi/dotnet-8-sdk-defaultpkg:apk/wolfi/dotnet-8-targeting-packpkg:apk/wolfi/dotnet-bootstrap-8pkg:apk/wolfi/netstandard-8-targeting-packpkg:bitnami/dotnetpkg:bitnami/dotnet-sdkpkg:nuget/microsoft.netcore.app.runtime.linux-armpkg:nuget/microsoft.netcore.app.runtime.linux-arm64pkg:nuget/microsoft.netcore.app.runtime.linux-musl-armpkg:nuget/microsoft.netcore.app.runtime.linux-musl-arm64pkg:nuget/microsoft.netcore.app.runtime.linux-musl-x64pkg:nuget/microsoft.netcore.app.runtime.linux-x64pkg:nuget/microsoft.netcore.app.runtime.osx-arm64pkg:nuget/microsoft.netcore.app.runtime.osx-x64pkg:nuget/microsoft.netcore.app.runtime.win-armpkg:nuget/microsoft.netcore.app.runtime.win-arm64pkg:nuget/microsoft.netcore.app.runtime.win-x64pkg:nuget/microsoft.netcore.app.runtime.win-x86pkg:nuget/system.formats.asn1pkg:rpm/almalinux/aspnetcore-runtime-6.0pkg:rpm/almalinux/aspnetcore-runtime-8.0pkg:rpm/almalinux/aspnetcore-runtime-dbg-8.0pkg:rpm/almalinux/aspnetcore-targeting-pack-6.0pkg:rpm/almalinux/aspnetcore-targeting-pack-8.0pkg:rpm/almalinux/dotnetpkg:rpm/almalinux/dotnet-apphost-pack-6.0pkg:rpm/almalinux/dotnet-apphost-pack-8.0pkg:rpm/almalinux/dotnet-hostpkg:rpm/almalinux/dotnet-hostfxr-6.0pkg:rpm/almalinux/dotnet-hostfxr-8.0pkg:rpm/almalinux/dotnet-runtime-6.0pkg:rpm/almalinux/dotnet-runtime-8.0pkg:rpm/almalinux/dotnet-runtime-dbg-8.0pkg:rpm/almalinux/dotnet-sdk-6.0pkg:rpm/almalinux/dotnet-sdk-6.0-source-built-artifactspkg:rpm/almalinux/dotnet-sdk-8.0pkg:rpm/almalinux/dotnet-sdk-8.0-source-built-artifactspkg:rpm/almalinux/dotnet-sdk-dbg-8.0pkg:rpm/almalinux/dotnet-targeting-pack-6.0pkg:rpm/almalinux/dotnet-targeting-pack-8.0pkg:rpm/almalinux/dotnet-templates-6.0pkg:rpm/almalinux/dotnet-templates-8.0pkg:rpm/almalinux/netstandard-targeting-pack-2.1
< 8.0.7-r0+ 60 more
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.11-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: < 8.0.11-r0
- (no CPE)range: < 8.0.7-r0
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 8.0.0, < 8.0.7
- (no CPE)range: >= 6.0.0, < 6.0.32
- (no CPE)range: >= 5.0.0-preview.7.20364.11, < 6.0.1
- (no CPE)range: < 6.0.32-1.el8_10
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 6.0.32-1.el8_10
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.107-1.el8_10
- (no CPE)range: < 6.0.32-1.el8_10
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 6.0.32-1.el8_10
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 6.0.32-1.el8_10
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 6.0.132-1.el8_10
- (no CPE)range: < 6.0.132-1.el8_10
- (no CPE)range: < 8.0.107-1.el9_4
- (no CPE)range: < 8.0.107-1.el9_4
- (no CPE)range: < 8.0.107-1.el9_4
- (no CPE)range: < 6.0.32-1.el8_10
- (no CPE)range: < 8.0.7-1.el9_4
- (no CPE)range: < 6.0.132-1.el8_10
- (no CPE)range: < 8.0.107-1.el9_4
- (no CPE)range: < 8.0.107-1.el9_4
- Microsoft/Microsoft Visual Studio 2022 version 17.10v5Range: 17.10
- Microsoft/Microsoft Visual Studio 2022 version 17.4v5Range: 17.4.0
- Microsoft/Microsoft Visual Studio 2022 version 17.6v5Range: 17.6.0
- Microsoft/Microsoft Visual Studio 2022 version 17.8v5Range: 17.8.0
- Microsoft/.NET 6.0v5Range: 6.0.0
- Microsoft/.NET 8.0v5Range: 8.0
- Microsoft/PowerShell 7.2v5Range: 7.2.0
- Microsoft/PowerShell 7.4v5Range: 7.4.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-447r-wph3-92pmghsaADVISORY
- msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38095ghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2024-38095ghsaADVISORY
- github.com/dotnet/runtime/security/advisories/GHSA-447r-wph3-92pmghsaWEB
News mentions
0No linked articles in our index yet.