Applies to:
Microsoft .NET Framework 3.5
Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.
View products that this article applies to.
An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory. To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application. The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.
To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).
Before installing this update
Prerequisite:
To apply this update, you must have .NET Framework 3.5 installed.
Install this update
Release Channel | Available | Next Step |
Microsoft Update Catalog | Yes | To get the standalone package for this update, go to the Microsoft Update Catalog website. |
Windows Server Update Services (WSUS) | Yes | This update will automatically sync with WSUS if you configure Products and Classifications as follows: Product:Windows Server 2012 Classification: Security Updates |
To apply this update, you must have .NET Framework 3.5 installed.
You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
20201013 Security update deployment information: October 13, 2020
Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.
This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.
File name | SHA1 hash | SHA256 hash |
---|---|---|
Windows8-RT-KB4578978-x64.msu | 401EADC05E1350F85FF505EC0D423C998978A474 | 719BA4BE1DF47485BC04D92D8CAE80FEF517C357BF38163F0E2D29CD272A81A1 |
The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
File name | File version | File size | Date | Time | Platform |
System.security.dll | 2.0.50727.8952 | 274,432 | 29-Aug-2020 | 13:09 | x86 |
System.security.dll | 2.0.50727.8952 | 274,432 | 29-Aug-2020 | 13:09 | x86 |
Keywords: Vulnerabilities/exploits/security bulletins, kbContentAuto, kbSupportTopic, atdownload, kbbug, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew, kb, kbexpertiseinter