{"url":"http://public2.vulnerablecode.io/api/packages/145157?format=json","purl":"pkg:nuget/Microsoft.Native.Quic.MsQuic.Schannel@2.2.0","type":"nuget","namespace":"","name":"Microsoft.Native.Quic.MsQuic.Schannel","version":"2.2.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/16926?format=json","vulnerability_id":"VCID-3gdg-wj5w-kqe8","summary":"Remote Denial of Service Vulnerability in Microsoft QUIC\n### Impact\nThe MsQuic server will continue to leak memory until no more is available, resulting in a denial of service.\n\n### Patches\nThe following patch was made:\n\n - Fix Memory Leak from Multiple Decodes of TP - https://github.com/microsoft/msquic/commit/5d070d661c45979946615289e92bb6b822efe9e9\n\n### Workarounds\nBeyond upgrading to the patched versions, there is no other workaround.\n\n### MSRC CVE Info\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190","references":[{"reference_url":"https://github.com/microsoft/msquic","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/microsoft/msquic"},{"reference_url":"https://github.com/microsoft/msquic/commit/5d070d661c45979946615289e92bb6b822efe9e9","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/microsoft/msquic/commit/5d070d661c45979946615289e92bb6b822efe9e9"},{"reference_url":"https://github.com/microsoft/msquic/commit/933f7b79949bc588945672396d70b661143bb8f0","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/microsoft/msquic/commit/933f7b79949bc588945672396d70b661143bb8f0"},{"reference_url":"https://github.com/microsoft/msquic/security/advisories/GHSA-2x7m-gf85-3745","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/microsoft/msquic/security/advisories/GHSA-2x7m-gf85-3745"},{"reference_url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26190"},{"reference_url":"https://github.com/advisories/GHSA-2x7m-gf85-3745","reference_id":"GHSA-2x7m-gf85-3745","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-2x7m-gf85-3745"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/56580?format=json","purl":"pkg:nuget/Microsoft.Native.Quic.MsQuic.Schannel@2.2.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.Native.Quic.MsQuic.Schannel@2.2.7"},{"url":"http://public2.vulnerablecode.io/api/packages/56582?format=json","purl":"pkg:nuget/Microsoft.Native.Quic.MsQuic.Schannel@2.3.5","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.Native.Quic.MsQuic.Schannel@2.3.5"}],"aliases":["GHSA-2x7m-gf85-3745"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3gdg-wj5w-kqe8"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.Native.Quic.MsQuic.Schannel@2.2.0"}