Microsoft Silverlight 5 Developer Runtime when installed on Mac Microsoft Silverlight 5 when installed on Mac **Vulnerability Severity Rating and Maximum Security Impact by Affected Software** For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the December bulletin summary. The following severity ratings assume the potential maximum impact of the vulnerability. Severity Ratings and Vulnerability Identifiers () when installed on all supported releases of Microsoft Windows servers () when installed on all supported releases of Microsoft Windows clients To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle. Versions or editions that are not listed are either past their support life cycle or are not affected. The following software versions or editions are affected. For more information about the vulnerabilities, see the Vulnerability Information section.įor more information about this update, see Microsoft Knowledge Base Article 3106614. The update addresses the vulnerabilities by correcting how Microsoft Silverlight handles certain open and close web requests, and by correcting how memory is handled to maintain the integrity of Address Space Layout Randomization (ASLR) in Silverlight. For more information, see the Affected Software section. This security update is rated Critical for Microsoft Silverlight 5 and Microsoft Silverlight 5 Developer Runtime when installed on Mac or all supported releases of Microsoft Windows. Instead, an attacker would have to convince a user to take action, such as clicking a link that takes the user to the attacker's website. The attacker could also take advantage of websites containing specially crafted content, including those that accept or host user-provided content or advertisements.Īn attacker would have no way to force users to visit a compromised website. To exploit the vulnerability, an attacker could host a website that contains a specially crafted Silverlight application and then convince a user to visit a compromised website. The most severe of the vulnerabilities could allow remote code execution if Microsoft Silverlight incorrectly handles certain open and close requests that could result in read- and write-access violations. This security update resolves vulnerabilities in Microsoft Silverlight. In this article Security Update for Silverlight to Address Remote Code Execution (3106614)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |