View products that this article applies to.

Summary

This security update for the Microsoft .NET Framework resolves a security feature bypass vulnerability in which the .NET Framework (and the .NET Core) components don't completely validate certificates. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2017-0248.

This update also contains security-enhancing fixes to the Windows Presentation Framework PackageDigitalSignatureManager component's ability to sign packages with the SHA256 hash algorithm.

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Additional information about this security update

The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known-issue information.

  • 4014506 Description of the Security and Quality Rollup for the .NET Framework 4.6.2 for Windows Server 2012: May 9, 2017

  • 4014509 Description of the Security and Quality Rollup for the .NET Framework 4.6 and 4.6.1 for Windows Server 2012: May 9, 2017

  • 4014513 Description of the Security and Quality Rollup for the .NET Framework 4.5.2 for Windows Server 2012: May 9, 2017

  • 4014503 Description of the Security and Quality Rollup for the .NET Framework 3.5 Service Pack 1 for Windows Server 2012: May 9, 2017

How to obtain help and support for this security update

Applies to

This article applies to the following:
 

  • Microsoft .NET Framework 3.5 Service Pack 1, 4.5.2, 4.6, 4.6.1, and 4.6.2 when used with:

    • Windows Server 2012

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Any additional feedback? (Optional)

Thank you for your feedback!

×