MS16-120: Description of the Security and Quality Rollup for .NET Framework 3.5 for Windows Server 2012: October 11, 2016


Summary


This update resolves vulnerabilities in Microsoft .NET Framework. The vulnerabilities could allow remote code execution if a user visits a specially crafted website or opens a specially crafted document. This update addresses the vulnerabilities by correcting how the Windows font library handles embedded fonts. To learn more about this vulnerability, see Microsoft Security Bulletin MS16-120.

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install this update



Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see the "Turn on automatic updating in the Control Panel" section of this Safety & Security Center article.


Update deployment information

For deployment information about this update, see Microsoft Knowledge Base Article 3192884 .

Update removal information

Note We do not recommend that you remove any security update.

To remove this update, use the Programs and Features item in Control Panel.

Update restart information

This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.

Update replacement information

This update does not replace any previously released update.


Applies to

This article applies to the following:

  • Microsoft .NET Framework 3.5 when used with:

    • Windows Server 2012