MS11-028  MS11-028 - Critical : Vulnerability in .NET Framework Could Allow Remote Code Execution (2484015) - Version: 2.4

Version2011-11-30 Severity Rating: Critical Revision Note: V2.4 (November 30, 2011): Corrected the bulletin replacement information for .NET Framework 4 on Windows 7 for x64-based Systems Service Pack 1, Windows Server 2008 R2 for x64-based Systems Service Pack 1, and Windows Server 2008 R2 for Itanium-based Systems Service Pack 1. This is a bulletin change only. There were no changes to the detection or security update files. Summary: This security update resolves a publicly disclosed vulnerability in Microsoft .NET Framework. The vulnerability could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs). Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The vulnerability could also allow remote code execution on a server system running IIS, if that server al
Bulletin details at

Related CVE Entries

The x86 JIT compiler in Microsoft .NET Framework 2.0 SP2, 3.5 SP1, 3.5.1, and 4.0 does not properly compile function calls, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, or (3) a crafted .NET Framework application, aka ".NET Framework Stack Corruption Vulnerability."
Max Base Score
Published 2011-04-13
Updated 2020-09-28
EPSS 24.52%
This web site uses cookies for managing your session and website analytics (Google analytics) purposes as described in our privacy policy.
By using this web site you are agreeing to terms of use!