CVE-2024-28252 – corewcf.netframingbase
Package
Manager: nuget
Name: corewcf.netframingbase
Vulnerable Version: >=1.4.0 <1.4.2 || >=1.5.0 <1.5.2
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00126 pctl0.32703
Details
CoreWCF NetFraming based services can leave connections open when they should be closed ### Impact If you have a NetFraming based CoreWCF service, extra system resources could be consumed by connections being left established instead of closing or aborting them. There are two scenarios when this can happen. When a client established a connection to the service and sends no data, the service will wait indefinitely for the client to initiate the NetFraming session handshake. Additionally, once a client has established a session, if the client doesn't send any requests for the period of time configured in the binding ReceiveTimeout, the connection is not properly closed as part of the session being aborted. The bindings affected by this behavior are NetTcpBinding, NetNamedPipeBinding, and UnixDomainSocketBinding. Only NetTcpBinding has the ability to accept non local connections. ### Patches The currently supported versions of CoreWCF are v1.4.x and v1.5.x. The fix can be found in v1.4.2 and v1.5.2 of the CoreWCF packages. ### Workarounds There are no workarounds. ### References https://github.com/CoreWCF/CoreWCF/issues/1345
Metadata
Created: 2024-03-15T19:20:17Z
Modified: 2025-04-09T19:58:40Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/03/GHSA-32jq-mv89-5rx7/GHSA-32jq-mv89-5rx7.json
CWE IDs: ["CWE-404"]
Alternative ID: GHSA-32jq-mv89-5rx7
Finding: F108
Auto approve: 1