{"id":223,"date":"2014-08-12T10:00:00","date_gmt":"2014-08-12T10:00:00","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/dotnet\/2014\/08\/12\/august-2014-security-updates\/"},"modified":"2021-09-30T16:37:26","modified_gmt":"2021-09-30T23:37:26","slug":"august-2014-security-updates","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/dotnet\/august-2014-security-updates\/","title":{"rendered":"August 2014 Security Updates"},"content":{"rendered":"<p style=\"text-align: justify\">The .NET team released a security bulletin today as part of the monthly &ldquo;patch Tuesday&rdquo; cycle.<\/p>\n<p style=\"text-align: justify\"><strong><a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms14-046.aspx\">Microsoft Security Bulletin MS14-046 &#8211; Important<\/a><\/strong><strong>, <\/strong>Vulnerabilities in .NET Framework could&nbsp;allow Security Feature Bypass (<a href=\"http:\/\/support.microsoft.com\/kb\/2984625\">2984625<\/a>).<\/p>\n<p style=\"text-align: justify\">This update resolves a vulnerability in the Microsoft .NET Framework that could bypass the Address Space Layout Randomization (ASLR) security feature if a user goes to a specially crafted website.<\/p>\n<p style=\"text-align: justify\">This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, and Microsoft .NET Framework 3.5.1 on affected editions of Microsoft Windows.<\/p>\n<p style=\"text-align: justify\">More details about the versions affected by this vulnerability can be found in the security bulletin <a title=\"MS14-046\" href=\"http:\/\/technet.microsoft.com\/en-us\/security\/bulletin\/ms14-046\">MS14-046<\/a>.<\/p>\n<p style=\"text-align: justify\"><span style=\"font-size: small\"><br><\/span><span style=\"font-size: small\"><strong>How to obtain help and support for this security update<\/strong><\/span><\/p>\n<ul style=\"text-align: justify\">\n<li><span style=\"font-size: small\">Help installing updates: <a href=\"http:\/\/support.microsoft.com\/ph\/6527\">Support for Microsoft Update<\/a><\/span><\/li>\n<li><span style=\"font-size: small\">Security solutions for IT professionals: <a href=\"http:\/\/technet.microsoft.com\/security\/bb980617.aspx\">TechNet Security Troubleshooting and Support<\/a><\/span><\/li>\n<li><span style=\"font-size: small\">Help protect your computer that is running Windows from viruses and malware: <a href=\"http:\/\/support.microsoft.com\/contactus\/cu_sc_virsec_master\">Virus Solution and Security Center<\/a><\/span><\/li>\n<li><span style=\"font-size: small\">Local support according to your country: <a href=\"http:\/\/support.microsoft.com\/common\/international.aspx\">International Support<\/a><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The .NET team released a security bulletin today as part of the monthly &ldquo;patch Tuesday&rdquo; cycle. Microsoft Security Bulletin MS14-046 &#8211; Important, Vulnerabilities in .NET Framework could&nbsp;allow Security Feature Bypass (2984625). This update resolves a vulnerability in the Microsoft .NET Framework that could bypass the Address Space Layout Randomization (ASLR) security feature if a user [&hellip;]<\/p>\n","protected":false},"author":339,"featured_media":58792,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[685],"tags":[11,20,124,126,157,159,160],"class_list":["post-223","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dotnet","tag-net-framework","tag-net-update","tag-security-update","tag-servicing","tag-windows-update","tag-wsus","tag-wu"],"acf":[],"blog_post_summary":"<p>The .NET team released a security bulletin today as part of the monthly &ldquo;patch Tuesday&rdquo; cycle. Microsoft Security Bulletin MS14-046 &#8211; Important, Vulnerabilities in .NET Framework could&nbsp;allow Security Feature Bypass (2984625). This update resolves a vulnerability in the Microsoft .NET Framework that could bypass the Address Space Layout Randomization (ASLR) security feature if a user [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts\/223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/users\/339"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts\/223\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/media\/58792"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/media?parent=223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/categories?post=223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/tags?post=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}