Microsoft Visual Studio/ .NET DoS Vulnerability (CVE-2024-43485)
CVE-2024-43485 Published on October 8, 2024
.NET and Visual Studio Denial of Service Vulnerability
.NET and Visual Studio Denial of Service Vulnerability
Weakness Type
Inefficient Algorithmic Complexity
An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system performance and can be triggered by an attacker, typically using crafted manipulations that ensure that the worst case is being reached.
Products Associated with CVE-2024-43485
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-43485 are published in these products:
Affected Versions
Microsoft PowerShell 7.2:- Version 7.2.0 and below 7.2.24 is affected.
- Version 7.4.0 and below 7.4.6 is affected.
- Version 17.6.0 and below 17.6.20 is affected.
- Version 17.8.0 and below 17.8.15 is affected.
- Version 17.10 and below 17.10.8 is affected.
- Version 17.11 and below 17.11.5 is affected.
- Version 7.5.0 and below 7.5.0 is affected.
- Version 8.0.0 and below 8.0.10 is affected.
- Version 6.0.0 and below 6.0.35 is affected.
Vulnerable Packages
The following package name and versions may be associated with CVE-2024-43485
| Package Manager | Vulnerable Package | Versions | Fixed In |
|---|---|---|---|
| nuget | System.Text.Json | >= 6.0.0, <= 6.0.33 | 6.0.35 |
| nuget | System.Text.Json | >= 8.0.0, <= 8.0.8 | 8.0.10 |
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.