SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Microsoft .NET Vendors:   Microsoft
(Red Hat Issues Fix) Microsoft .NET Hash Collision Bug Lets Remote Users Deny Service
SecurityTracker Alert ID:  1040550
SecurityTracker URL:  http://securitytracker.com/id/1040550
CVE Reference:   CVE-2018-0875   (Links to External Site)
Date:  Mar 19 2018
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): .NET Core 1.0, .NET Core 1.1, .NET Core 2.0, PowerShell Core 6.0.0
Description:   A vulnerability was reported in Microsoft .NET. A remote user can cause denial of service conditions on the target system.

A remote user can send a small number of specially crafted requests to trigger a hash collision error and cause performance degradation on the target application

Ben Adams of Illyriad Games reported this vulnerability.

Impact:   A remote user can cause performance degradation on the target application.
Solution:   Red Hat has issued a fix.

The Red Hat advisory is available at:

https://access.redhat.com/errata/RHSA-2018:0522

Vendor URL:  access.redhat.com/errata/RHSA-2018:0522 (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  7

Message History:   This archive entry is a follow-up to the message listed below.
Mar 13 2018 Microsoft .NET Hash Collision Bug Lets Remote Users Deny Service



 Source Message Contents

Subject:  [RHSA-2018:0522-01] Low: .NET Core on Red Hat Enterprise Linux security update

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Low: .NET Core on Red Hat Enterprise Linux security update
Advisory ID:       RHSA-2018:0522-01
Product:           .NET Core on Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2018:0522
Issue date:        2018-03-14
CVE Names:         CVE-2018-0875 
=====================================================================

1. Summary:

Updates for rh-dotnet20-dotnet, rh-dotnetcore10-dotnetcore, and
rh-dotnetcore11-dotnetcore are now available for .NET Core on Red Hat
Enterprise Linux.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Server (v. 7) - x86_64
.NET Core on Red Hat Enterprise Linux Workstation (v. 7) - x86_64

3. Description:

.NET Core is a managed software framework. It implements a subset of the
.NET framework APIs and includes a CLR implementation.

New versions of .NET Core that address several security vulnerabilities are
now available. The updated versions are .NET Core 1.0.10, 1.1.7, and 2.0.6.

These correspond to the March 2018 security release by .NET Core upstream
projects.

Security Fix(es):

* .NET Core: Hash Collision Denial of Service (CVE-2018-0875)

Red Hat would like to thank Ben Adams (Illyriad Games) for reporting this
issue.

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1552060 - CVE-2018-0875 .NET Core: Hash Collision Denial of Service

6. Package List:

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux ComputeNode (v. 7):

Source:
rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm

x86_64:
rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Server (v. 7):

Source:
rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm

x86_64:
rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnetcore10-dotnetcore-1.0.10-1.el7.src.rpm

x86_64:
rh-dotnetcore10-dotnetcore-1.0.10-1.el7.x86_64.rpm
rh-dotnetcore10-dotnetcore-debuginfo-1.0.10-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnetcore11-dotnetcore-1.1.7-1.el7.src.rpm

x86_64:
rh-dotnetcore11-dotnetcore-1.1.7-1.el7.x86_64.rpm
rh-dotnetcore11-dotnetcore-debuginfo-1.1.7-1.el7.x86_64.rpm

.NET Core on Red Hat Enterprise Linux Workstation (v. 7):

Source:
rh-dotnet20-dotnet-2.0.6-1.el7.src.rpm

x86_64:
rh-dotnet20-dotnet-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-debuginfo-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-host-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-runtime-2.0-2.0.6-1.el7.x86_64.rpm
rh-dotnet20-dotnet-sdk-2.1-2.1.101-1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2018-0875
https://access.redhat.com/security/updates/classification/#low

8. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFaqUTsXlSAg2UNWIIRAuzUAKCDhqW/mE1ZwG1Bv9JVc2oVTo7cngCfUnVc
slFh/sAwzwax82xICfw1G1M=
=37s1
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC