Patch Name | Windows6.0-KB974291-x64.msu | ||||||||
Patch Description | .NET Framework 2.0 Service Pack 1 CLR Security Update for Windows Vista Service Pack 1 and Windows Server 2008 Brief Description A security issue has been identified that could allow an attacker to compromise your Windows-based system with the Microsoft . | ||||||||
Bulletin Id | MS09-061 | ||||||||
Bulletin Title | Vulnerabilities in the Microsoft .NET Common Language Runtime Could Allow Remote Code Execution (974378) | ||||||||
Severity | Critical | ||||||||
Location Path | Windows6.0-KB974291-x64.msu | ||||||||
Bulletin Summary | This security update resolves three privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario. Microsoft .NET applications, Silverlight applications, XBAPs and ASP.NET pages that are not malicious are not at risk of being compromised because of this vulnerability. | ||||||||
Superceding Bulletin Id | None | ||||||||
Patch Release Date | Oct 13, 2009 | ||||||||
Affected Product Information
|
Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.