Microsoft Releases Out Of Band Security Patch

Martin Brinkmann
Sep 28, 2010
Updated • Dec 13, 2014
Security, Windows Updates
|
0

Microsoft today released a new out of band security bulletin addressing a vulnerability in ASP.NET that affects all versions of the Microsoft .Net Framework when used on Windows Server operating systems, or on client systems that run a web server from their computer.

While that excludes the majority of desktop users, it may still affect some that run web servers on their desktop systems. Those users are asked to update immediately once the patch is released.

About the release: Microsoft will make the security patch available on Microsoft Download first, before it will be distributed via Windows Update. Dave Forstrom, Director, Trustworthy Computing said it will take approximately a few days before the update is released on Windows Update and Windows Server Update as well.

For now, Windows Server users and Windows client users running a web server should monitor Microsoft's Download Center for the patch, which will be made available there later today.

Admins who want additional information can take a closer look at the Microsoft Security Bulletin, which lists the affected operating systems, the maximum security impact and additional information about the vulnerability.

This security update resolves a publicly disclosed vulnerability in ASP.NET. The vulnerability could allow information disclosure. An attacker who successfully exploited this vulnerability could read data, such as the view state, which was encrypted by the server. This vulnerability can also be used for data tampering, which, if successfully exploited, could be used to decrypt and tamper with the data encrypted by the server. Microsoft .NET Framework versions prior to Microsoft .NET Framework 3.5 Service Pack 1 are not affected by the file content disclosure portion of this vulnerability.

This security update is rated Important for all supported editions of ASP.NET except Microsoft .NET Framework 1.0 Service Pack 3. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerability by additionally signing all data that is encrypted by ASP.NET. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Windows client users who are not running a web server are not affected by the vulnerability. Some may want to consider installing the update nevertheless.

Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. Paul(us) said on December 27, 2010 at 2:05 am
    Reply

    I first read about the updates/always check them/ test them before installing them. Then i make a total mirror image from the (operating) system, with the new installed updates. After that i start cleaning up the updates on main operating system disk.

  2. pitman said on December 27, 2010 at 8:54 am
    Reply

    I let it download stuff but choose what to install, that is how I can avoid some crap it tries to install like “Live Essentials” and generally I like to have control.

  3. ilev said on December 27, 2010 at 9:07 am
    Reply

    The problem with Windows Updates isn’t what you know , but the crap Microsoft is sneaking into your PC , secretly, behind your back, like Firefox add-ons,…..

  4. Bjørn said on November 8, 2015 at 2:56 pm
    Reply

    “Recommended updates are otherwise (with the option disabled) displayed as available updates but installed automatically.”

    Shouldn’t this be:

    Recommended updates are otherwise (with the option disabled) displayed as available updates but NOT installed automatically.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.