Security and Quality Rollup for .NET Framework (Sep 2017)
High Nessus Plugin ID 103137
SynopsisThe remote Windows host has a software framework installed that is affected by a security feature bypass vulnerability.
DescriptionThe .NET Framework installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerability:
- A remote code execution vulnerability exists when Microsoft .NET Framework processes untrusted input. An attacker who successfully exploited this vulnerability in software using the .NET framework could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
SolutionMicrosoft has released a set of patches for Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, and 4.7