Patch Repository

.NET Framework 3.5 Patch Details
Patch Name Windows6.0-2008-KB983587-x86.msu
Patch Description Security Update for Microsoft .NET Framework 3.5, Windows Vista Service Pack 1 and Windows Server 2008 (KB983587)
Bulletin Id MS10-060
Bulletin Title Vulnerabilities in the Microsoft .NET Common Language Runtime and in Microsoft Silverlight Could Allow Remote Code Execution (2265906)
Severity Critical
Location Path Windows6.0-2008-KB983587-x86.msu
Bulletin Summary This security update resolves two privately reported vulnerabilities in Microsoft .NET Framework and Microsoft Silverlight. The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in convincing a user to run a specially crafted Microsoft .NET application.
Superceding Bulletin Id None
Patch Release Date Aug 10, 2010

Affected Product Information

Product Name Service Pack Name
.NET Framework 2.0.NET Framework 2.0 SP1
Windows Server 2008 Standard EditionWindows Server 2008 SP1
Windows Server 2008 Enterprise EditionWindows Server 2008 SP1
Windows Server 2008 Datacenter EditionWindows Server 2008 SP1
.NET Framework 3.5.NET Framework 3.5 Gold
Windows Server 2008 Foundation EditionWindows Server 2008 SP1
Windows Server 2008 Web Server EditionWindows Server 2008 SP1
Windows Server 2008 HPC EditionWindows Server 2008 SP1
Windows Server 2008 Datacenter Edition without Hyper-VWindows Server 2008 SP1
Windows Server 2008 Enterprise Edition without Hyper-VWindows Server 2008 SP1
Windows Server 2008 Standard Edition without Hyper-VWindows Server 2008 SP1

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.