<html><body><p>Describes a security update that resolves a vulnerability in ASP.NET MVC that could allow security feature bypass if an attacker convinces a user to click a specially crafted link or to go to a webpage that contains specially crafted content.</p><h2></h2><div><span></span><a href=“#appliestoproducts” target>View products that this article applies to.</a></div><h2>INTRODUCTION</h2><div>Microsoft has released security bulletin MS14-059. To learn more about this security bulletin:<br /><ul><li>Home users:<br /><div><a href=“https://www.microsoft.com/security/pc-security/updates.aspx” target=“_self”>https://www.microsoft.com/security/pc-security/updates.aspx</a></div><span>Skip the details</span>: Download the updates for your home computer or laptop from the Microsoft Update website now:<br /><div><a href=“https://update.microsoft.com/microsoftupdate/” target=“_self”>https://update.microsoft.com/microsoftupdate/</a></div></li><li>IT professionals:<br /><div><a href=“https://technet.microsoft.com/library/security/ms14-059” target=“_self”>https://technet.microsoft.com/library/security/MS14-059</a></div></li></ul><h3>Download information</h3><span>The following files are available for download from the Microsoft Download Center. <br /></span><h4>For all supported versions of Microsoft ASP.NET</h4><span><img alt=“Download” src=“/library/images/support/kbgraphics/public/en-us/download.gif” title=“Download” /><a href=“http://www.microsoft.com/download/details.aspx?familyid=7d07b199-e7b6-4526-930c-cea52dc15b95” target=“_self”>Download the package now.</a></span><br /><br /><span>Release Date: October 14, 2014<br /><br />For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:<br /><div><a href=“https://support.microsoft.com/en-us/help/119591”>119591 </a> How to obtain Microsoft support files from online services</div>Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file.<br /></span><h3>How to obtain help and support for this security update</h3>Help installing updates:<br /><a href=“https://support.microsoft.com/ph/6527” target=“_self”>Support for Microsoft Update</a><br /><br />Security solutions for IT professionals:<br /><a href=“https://technet.microsoft.com/security/bb980617.aspx” target=“_self”>TechNet Security Troubleshooting and Support</a><br /><br />Help protect your Windows-based computer from viruses and malware: <a href=“https://support.microsoft.com/contactus/cu_sc_virsec_master” target=“_self”>Virus Solution and Security Center</a><br /><br />Local support according to your country:<br /><a href=“https://support.microsoft.com/common/international.aspx” target=“_self”>International Support</a><br /><br /></div><h2>More Information</h2><div><ul><li>For more information about deployment options to address this security vulnerability, see the <a href=“https://technet.microsoft.com/library/security/ms14-059” target=“_self”>MS14-059</a> security bulletin. This update will be offered through Microsoft Update, the Microsoft Download Center, and updated NuGet packages. The security bulletin will provide correct guidance about which deployment option is required to help make sure that your computer and applications are secure. </li><li>Also, see the “Update FAQ” section of <a href=“https://technet.microsoft.com/library/security/ms14-059” target=“_self”>MS14-059</a> to better understand how Microsoft security updates for .NET NuGet Libraries are supported, how to determine which version of ASP.NET Model-View-Controller (MVC) is installed on your computer, which computers are offered the update through Microsoft Update, and other important information.</li></ul><h3>Known issues and more information about this security update</h3>The following articles contain more information about this security update as it relates to individual product versions. The articles may contain known issue information. If this is the case, the known issue is listed under each article link.<br /><ul><li><div><a href=“https://support.microsoft.com/en-us/help/2994397”>2994397 </a> MS14-059: Description of the security update for ASP.NET MVC 5.1: October 14, 2014 </div></li><li><div><a href=“https://support.microsoft.com/en-us/help/2992080”>2992080 </a> MS14-059: Description of the security update for ASP.NET MVC 5.0: October 14, 2014 </div></li><li><div><a href=“https://support.microsoft.com/en-us/help/2993928”>2993928 </a> MS14-059: Description of the security update for ASP.NET MVC 4.0: October 14, 2014 </div>Known issues in security update 2993928:<br /><ul><li><span>Symptom</span><br />After you install this security update, all Azure Pack PowerShell commands return the following exemption:<br /> <br /><br /><br /><br /><div> <br />Method not found: 'Void Newtonsoft.Json.Serialization.DefaultContractResolver.set_IgnoreSerializableAttribute(Boolean)<br /></div><br /><span>Resolution</span><br />To resolve this issue, install Update Rollup 4 for Windows Azure Pack. For more information, click the following article number to view the article in the Microsoft Knowledge Base:<br /><div><a href=“https://support.microsoft.com/en-us/help/2992027”>2992027 </a> Update Rollup 4 for Windows Azure Pack<br /></div></li></ul></li><li><div><a href=“https://support.microsoft.com/en-us/help/2993937”>2993937 </a> MS14-059: Description of the security update for ASP.NET MVC 3.0: October 14, 2014 </div></li><li><div><a href=“https://support.microsoft.com/en-us/help/2993939”>2993939 </a> MS14-059: Description of the security update for ASP.NET MVC 2.0: October 14, 2014 </div></li></ul><a></a><h3>Applies to</h3>This article applies to the following:<br /><ul><li>ASP.NET MVC 2.0</li><li>ASP.NET MVC 3.0</li><li>ASP.NET MVC 4.0</li><li>ASP.NET MVC 5.0</li><li>ASP.NET MVC 5.1</li></ul><div><div><div><span><span></span></span><span><span>File hash information</span></span></div><div><span><div><div><table><tr><th>File name</th><th>SHA1 hash</th><th>SHA256 hash</th></tr><tr><td>AspNetMVC2-KB2993939.EXE</td><td>1E3F60495160A568ADB51B09AF5C7B0A95146764</td><td>2B91A27DC45B11CB6977A214CF9E4DCF1E219F66876413F2A8D3DC4BE86B1175</td></tr><tr><td>AspNetMVC3-KB2993937.EXE</td><td>414B06C8F9800E88E1ABB6A28EAD93E445F92878</td><td>02885E91D4052E0DAC3EA06D2099D9F9CCBE20B27AF9B9FF64813D9383F2126A</td></tr><tr><td>AspNetMVC4-KB2993928.EXE</td><td>760CF4C85474BBE1809B9FAB9B2996FF04C23B88</td><td>105089F03358AB2437722C070EC1F4F43FA8BE9BD4D85802D3374D204ADB948E</td></tr><tr><td>AspNetWebFxUpdate_KB2992080.EXE</td><td>55C239C6B443CB122B04667A9BE948B03046BF88</td><td>D10482E256F90D03E7B0069ED1287C14776DCCD2E3A766FD27B4BE76B78C26AC</td></tr><tr><td>AspNetWebFxUpdate_KB2994397.EXE</td><td>BBE73C4BF9AA4747F6753CACA095A5459EC277BE</td><td>5A42E9F3847EAC08FD6B1F8A55B0AED149507034AA68A11F7EB5D3993D3A6DD7</td></tr></table></div></div><br /></span></div></div></div></div></body></html>