Home / bulletins MS14-046 - Important: Vulnerability in .NET Framework Could Allow Security Feature Bypass (2984625) - Version: 1.1
Posted on 17 September 2014
There is an newer version: MS14-046 - Version: 1.2
ImportantSeverity Rating: Important
Revision Note: V1.1 (September 16, 2014): Bulletin revised to announce a detection change in the 2966827 update for Microsoft .NET Framework 3.0 Service Pack 2 on Windows 8 and Windows Server 2012. This is a detection change only. There were no changes to the update files. Customers who have already successfully updated their systems do not need to take any action.
Summary: This security update resolves a privately reported vulnerability in Microsoft .NET Framework. The vulnerability could allow security feature bypass if a user visits a specially crafted website. In a web-browsing attack scenario, an attacker who successfully exploited this vulnerability could bypass the Address Space Layout Randomization (ASLR) security feature, which helps protect users from a broad class of vulnerabilities. The security feature bypass by itself does not allow arbitrary code execution. However, an attacker could use this ASLR bypass vulnerability in conjunction with another vulnerability, such as a remote code execution vulnerability, that could take advantage of the ASLR bypass to run arbitrary code.Other versions
- MS14-046 - Version: 1.0
- MS14-046 - Version: 1.1
- MS14-046 - Version: 1.2