Applies to: Visual Studio 2015 Update 3 Community, Professional, Enterprise, and Test Pro
Does not apply to: Build Tools, Visual Studio 2015 Isolated and Integrated Shells
An elevation of privilege vulnerability exists if Microsoft Visual Studio updater service incorrectly handles file permissions, or the Visual Studio Extension Installer Service incorrectly handles file operations.
To learn more about the vulnerability, go to CVE-2020-0900.
How to obtain and install the update
Visual Studio 2015 Update 3
Method 1: Microsoft Download
The following file is available for download:
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
You must restart your computer before you install this update.
To apply this security update, you must have Visual Studio 2015 Update 3 installed.
You may have to restart the computer after you apply this security update if an instance of Visual Studio is being used.
Security update replacement information
This security update doesn't replace other security updates.
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
File hash information
|File name||SHA1 hash||SHA256 hash|
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.
To check that this security update was applied correctly, follow these steps:
- Open the Visual Studio 2015 folder.
- Navigate to Common7\IDE\PrivateAssemblies\Microsoft.VisualStudio.RemoteControl.dll.
- Verify that the file version is equal to 126.96.36.199130.