CVE-2021-24112: .NET Core Remote Code Execution Vulnerability
Overview
- Severity
- High (CVSS 8.1)
- CVSS Vector
- CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C
- Category
- Remote Code Execution
- Exploit Status
- Not Exploited
- Exploitation Likelihood
- Less Likely
- Patch Tuesday
- 2021-Feb
- Released
- 2021-02-09
- Last Updated
- 2021-02-24
- EPSS Score
- 1.11% (percentile: 78.1%)
FAQ
How could an attacker exploit this vulnerability?
When a .NET application utilizing libgdiplus on a non-Windows system accepts input, an attacker could send a specially crafted request that could result in remote code execution.
Does this vulnerability affect applications running on Windows?
No, Windows utilizes GDI+ to process these requests, and is not affected by this vulnerability.
Affected Products (5)
Developer Tools
- Visual Studio 2019 for Mac
- Mono 6.12.0
- .NET Core 2.1
- .NET Core 3.1
- .NET 5.0
Security Updates (5)
Revision History
- 2021-02-09: Information published.
- 2021-02-24: In the Security Updates table, added Visual Studio 2019 for Mac and Mono 6.12.0 because they are also affected by CVE-2021-24112. Microsoft recommends that customers running either of these products install the updates to be fully protected from the vulnerability.