Patch Repository

.NET Framework 2.0 (x64) Patch Details
Patch Name Windows6.1-KB2789644-x64.msu
Patch Description Security Update for Microsoft .NET Framework 3.5.1 on Windows 7 and Windows Server 2008 R2 (KB2789644)
Bulletin Id MS13-015
Bulletin Title Vulnerability in .NET Framework Could Allow Elevation of Privilege (2800277)
Severity Important
Location Path Windows6.1-KB2789644-x64.msu
Bulletin Summary This security update resolves one privately reported vulnerability in the .NET Framework. The vulnerability could allow elevation of privilege if a user views a specially crafted webpage using a web browser that can run XAML Browser Applications (XBAPs). The vulnerability could also be used by Windows .NET applications to bypass Code Access Security (CAS) restrictions. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Superceding Bulletin Id MS17-APR4
Patch Release Date Feb 12, 2013

Affected Product Information

Product Name Service Pack Name
.NET Framework 2.0 (x64).NET Framework 2.0 (x64) SP2
.NET Framework 3.5 (x64).NET Framework 3.5 (x64) SP1
Windows 7 Ultimate Edition (x64)Windows 7 Gold (x64)
Windows 7 Professional Edition (x64)Windows 7 Gold (x64)
Windows 7 Enterprise Edition (x64)Windows 7 Gold (x64)
Windows Server 2008 R2 Standard Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Enterprise Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Datacenter Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Web Server Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Foundation Edition (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Enterprise Edition (core installation) (x64)Windows Server 2008 R2 Gold (x64)
Windows Server 2008 R2 Standard Edition (core installation) (x64)Windows Server 2008 R2 Gold (x64)

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.