CVE Vulnerabilities

CVE-2023-33128

Use After Free

Published: Jun 14, 2023 | Modified: Nov 21, 2024
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
7.3 IMPORTANT
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

.NET and Visual Studio Remote Code Execution Vulnerability

Weakness

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory “belongs” to the code that operates on the new pointer.

Affected Software

NameVendorStart VersionEnd Version
.netMicrosoft6.0.0 (including)6.0.18 (excluding)
.netMicrosoft7.0.0 (including)7.0.7 (excluding)
Visual_studio_2022Microsoft17.0 (including)17.0.22 (excluding)
Visual_studio_2022Microsoft17.2 (including)17.2.16 (excluding)
Visual_studio_2022Microsoft17.4 (including)17.4.8 (excluding)
Visual_studio_2022Microsoft17.6 (including)17.6.3 (excluding)
.NET Core on Red Hat Enterprise LinuxRedHatrh-dotnet60-dotnet-0:6.0.118-1.el7_9*
Red Hat Enterprise Linux 8RedHatdotnet6.0-0:6.0.118-1.el8_8*
Red Hat Enterprise Linux 8RedHatdotnet7.0-0:7.0.107-1.el8_8*
Red Hat Enterprise Linux 8.6 Extended Update SupportRedHatdotnet6.0-0:6.0.120-1.el8_6*
Red Hat Enterprise Linux 9RedHatdotnet6.0-0:6.0.118-1.el9_2*
Red Hat Enterprise Linux 9RedHatdotnet7.0-0:7.0.107-1.el9_2*
Red Hat Enterprise Linux 9.0 Extended Update SupportRedHatdotnet6.0-0:6.0.120-1.el9_0*
Dotnet6Ubuntudevel*
Dotnet6Ubuntujammy*
Dotnet6Ubuntukinetic*
Dotnet6Ubuntulunar*
Dotnet6Ubuntuupstream*
Dotnet7Ubuntudevel*
Dotnet7Ubuntujammy*
Dotnet7Ubuntukinetic*
Dotnet7Ubuntulunar*
Dotnet7Ubuntuupstream*

Potential Mitigations

References