7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.972 High
EPSS
Percentile
99.8%
View products that this article applies to.
This security update resolves a vulnerability in the Microsoft .NET Framework that could allow remote code execution when Microsoft .NET Framework processes untrusted input. An attacker who successfully exploits this vulnerability in software by using the .NET Framework could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who operate by using administrative user rights.To exploit the vulnerability, an attacker must first convince the user to open a malicious document or application.This security update addresses the vulnerability by correcting how the .NET Framework validates untrusted input. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8759.Important
For more information about this security update as it relates to Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1, see the following article in the Microsoft Knowledge Base:4041090 Security Only update for the .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, and 4.7 updates for Windows 7 SP1 and Windows Server 2008 R2 SP1 and for the .NET Framework 4.6 for Windows Server 2008 SP2: September 12, 2017
To get the stand-alone package for this update, go to the Microsoft Update Catalog.
On your WSUS server, follow these steps:
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:20170912 Security update deployment information: September 12, 2017
Note We do not recommend that you remove any security update. To remove this update, use thePrograms and Features item in Control Panel.
This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.
This update replaces update 2978120.
Package Name | Package Hash SHA 1 | Package Hash SHA 2 |
---|---|---|
Windows6.1-KB4040966-ia64.msu | FFFD298DA2ED458AF62D59ABB08717D3FD32060D | 3B3967615B298883DC6FFF5D866B58609A69B8C65744925C9A2C9664080A9E42 |
Windows6.1-KB4040966-x64.msu | E7962089CE768C11B0AAFC644ABB7DF0E985BDEA | 00B3FBE60AAD3B57BBFFB0409CE8EEF83B3FACC570AF3875ED92D5353EBDD8F3 |
Windows6.1-KB4040966-x86.msu | B87D0590D06F1EEF94F71EABB8F64005AD2F81C6 | 253E3EC86079F1F683E6549F650E790C424A76B15EE7D4CB0508B5048091737E |
The English (United States) version of this hotfix installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.For all x86-based systemsFile name | File version | File size | Date | Time |
---|---|---|---|---|
system.runtime.remoting.dll | 2.0.50727.8771 | 307,200 | 31-Aug-2017 | 13:04 |
For all x64-based systemsFile name | File version | File size | Date | Time |
— | — | — | — | — |
system.runtime.remoting.dll | 2.0.50727.8771 | 307,200 | 31-Aug-2017 | 13:04 |
system.runtime.remoting.dll | 2.0.50727.8771 | 307,200 | 31-Aug-2017 | 13:04 |
For all IA64-based systemsFile name | File version | File size | Date | Time |
— | — | — | — | — |
system.runtime.remoting.dll | 2.0.50727.8771 | 307,200 | 31-Aug-2017 | 13:04 |
system.runtime.remoting.dll | 2.0.50727.8771 | 307,200 | 31-Aug-2017 | 13:04 |
This article applies to the following:
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.972 High
EPSS
Percentile
99.8%