Lookup for vulnerable packages by Package URL.

Purlpkg:nuget/Microsoft.Native.Quic.MsQuic.OpenSSL@2.3.0
Typenuget
Namespace
NameMicrosoft.Native.Quic.MsQuic.OpenSSL
Version2.3.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-3gdg-wj5w-kqe8
vulnerability_id VCID-3gdg-wj5w-kqe8
summary
Remote Denial of Service Vulnerability in Microsoft QUIC
### Impact
The MsQuic server will continue to leak memory until no more is available, resulting in a denial of service.

### Patches
The following patch was made:

 - Fix Memory Leak from Multiple Decodes of TP - https://github.com/microsoft/msquic/commit/5d070d661c45979946615289e92bb6b822efe9e9

### Workarounds
Beyond upgrading to the patched versions, there is no other workaround.

### MSRC CVE Info
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190
references
0
reference_url https://github.com/microsoft/msquic
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/microsoft/msquic
1
reference_url https://github.com/microsoft/msquic/commit/5d070d661c45979946615289e92bb6b822efe9e9
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/microsoft/msquic/commit/5d070d661c45979946615289e92bb6b822efe9e9
2
reference_url https://github.com/microsoft/msquic/commit/933f7b79949bc588945672396d70b661143bb8f0
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/microsoft/msquic/commit/933f7b79949bc588945672396d70b661143bb8f0
3
reference_url https://github.com/microsoft/msquic/security/advisories/GHSA-2x7m-gf85-3745
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/microsoft/msquic/security/advisories/GHSA-2x7m-gf85-3745
4
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190
5
reference_url https://github.com/advisories/GHSA-2x7m-gf85-3745
reference_id GHSA-2x7m-gf85-3745
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2x7m-gf85-3745
fixed_packages
0
url pkg:nuget/Microsoft.Native.Quic.MsQuic.OpenSSL@2.3.5
purl pkg:nuget/Microsoft.Native.Quic.MsQuic.OpenSSL@2.3.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.Native.Quic.MsQuic.OpenSSL@2.3.5
aliases GHSA-2x7m-gf85-3745
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3gdg-wj5w-kqe8
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.Native.Quic.MsQuic.OpenSSL@2.3.0