Patch Repository - latest Security Patches

.NET Framework 3.5 (x64) Patch Details
Patch Name Windows8-RT-KB2736693-x64.msu
Patch Description Security Update for Microsoft .NET Framework 3.5 on Windows 8 and Windows Server 2012 (KB2736693)
Bulletin Id MS13-007
Bulletin Title Vulnerability in Open Data Protocol Could Allow Denial of Service (2769327)
Severity Important
Location Path Windows8-RT-KB2736693-x64.msu
Bulletin Summary This security update resolves a privately reported vulnerability in the Open Data (OData) protocol. The vulnerability could allow denial of service if an unauthenticated attacker sends specially crafted HTTP requests to an affected site. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.
Superceding Bulletin Id None
Patch Release Date Jan 8, 2013

Affected Product Information

Product Name Service Pack Name
.NET Framework 3.5 (x64).NET Framework 3.5 (x64) SP1
Windows 8 Enterprise Edition (x64)Windows 8 Gold (x64)
Windows 8 Ultimate Edition (x64)Windows 8 Gold (x64)
Windows 8 Professional Edition (x64)Windows 8 Gold (x64)
Windows 8 Home Premium Edition (x64)Windows 8 Gold (x64)
Windows 8 Home Basic Edition (x64)Windows 8 Gold (x64)
Windows 8 Starter Edition (x64)Windows 8 Gold (x64)
Windows Server 2012 Foundation Edition (x64)Windows Server 2012 Gold (x64)
Windows Server 2012 Essentials Edition (x64)Windows Server 2012 Gold (x64)
Windows Server 2012 Standard Edition (x64)Windows Server 2012 Gold (x64)
Windows Server 2012 Datacenter Edition (x64)Windows Server 2012 Gold (x64)
Windows 8 (x64)Windows 8 Gold (x64)

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.