Impact
A stack‑based buffer overflow exists in the .NET framework and Visual Studio 2022, allowing an attacker to trigger a denial of service through malformed network input. The overflow leads to stack corruption and unhandled exceptions that crash the application, making it unavailable to legitimate users.
Affected Systems
The flaw affects Microsoft .NET releases 8.0, 9.0, and 10.0, as well as Visual Studio 2022 versions 17.12 and 17.14. Any instance of these products that processes untrusted data over a network is at risk.
Risk and Exploitability
The CVSS score of 7.5 indicates a serious impact, and while the EPSS score is not listed, the absence of a KEV entry suggests no known widespread exploitation yet. The likely attack vector is remote over the network, requiring an attacker to craft a malicious packet or payload that targets the vulnerable logic. Once executed, the overflow causes the application to crash, denying legitimate access. In the absence of additional mitigations, the risk remains significant for systems exposed to external traffic.
OpenCVE Enrichment