Posted October 19, 201113 yr Severity Rating: Critical Revision Note: V1.1 (October 19, 2011): Corrected the installing without restarting switch information for Microsoft .NET Framework 1.1 Service Pack 1. This is an informational change only. There were no changes to the security update files or detection logic. Summary: This security update resolves a privately reported vulnerability in Microsoft .NET Framework and Microsoft Silverlight. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and then executes the page, as could be the case in a Web hosting scenario. This vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. Read Bulletin
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.