Microsoft Security Bulletin MS16-155 - Important
Security Update for .NET Framework (3205640)
Published: December 13, 2016 | Updated: February 23, 2017
Version: 2.1
Executive Summary
This security update resolves a vulnerability in Microsoft .NET 4.6.2 Framework’s Data Provider for SQL Server. A security vulnerability exists in Microsoft .NET Framework 4.6.2 that could allow an attacker to access information that is defended by the Always Encrypted feature.
This security update is rated Important for Microsoft .NET Framework 4.6.2. For more information, see the Affected Software and Vulnerability Severity Ratings section.
The security update addresses the vulnerability by correcting the way .NET Framework handles the developer-supplied key, and thus properly defends the data.
For more information, see the Affected Software and Vulnerability Severity Ratings section.
For more information about this update, see Microsoft Knowledge Base Article 3205640.
Affected Software and Vulnerability Severity Ratings
The following software versions or editions are affected. Versions or editions that are not listed are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
The severity ratings indicated for each affected software assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin’s release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the December bulletin summary.
Note: Please see the Security Update Guide for a new approach to consuming the security update information. You can customize your views and create affected software spreadsheets, as well as download data via a restful API. For more information, please see the Security Updates Guide FAQ. As a reminder, the Security Updates Guide will be replacing security bulletins as of February 2017. Please see our blog post, Furthering our commitment to security updates, for more details.
Microsoft .NET Framework - Security Only Release[1]
Operating System | Component | .NET Information Disclosure Vulnerability - CVE-2016-7270 | Updates Replaced |
---|---|---|---|
Windows 7 and Windows Server 2008 R2 Microsoft .NET Framework Updates for 4.6.2 (KB3205406) [2] | |||
Windows 7 | |||
Windows 7 for 32-bit Systems Service Pack 1 | Microsoft .NET Framework 4.6.2 (3204805) | Important Information Disclosure | None |
Windows 7 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 4.6.2 (3204805) | Important Information Disclosure | None |
Windows Server 2008 R2 | |||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 4.6.2 (3204805) | Important Information Disclosure | None |
Windows Server 2012 Microsoft .NET Framework Updates for 4.6.2 (KB3205407) [2] | |||
Windows Server 2012 | Microsoft .NET Framework 4.6.2 (3204801) | Important Information Disclosure | None |
Windows 8.1 and Windows Server 2012 R2 Microsoft .NET Framework Updates for 4.6.2 (KB3205410) [2] | |||
Windows 8.1 | |||
Windows 8.1 for 32-bit Systems | Microsoft .NET Framework 4.6.2 (3204802) | Important Information Disclosure | None |
Windows 8.1 for x64-based Systems | Microsoft .NET Framework 4.6.2 (3204802) | Important Information Disclosure | None |
Windows 2012 R2 | |||
Windows Server 2012 R2 | Microsoft .NET Framework 4.6.2 (3204802) | Important Information Disclosure | None |
Windows 10 | |||
Windows 10 Version 1607 for 32-bit Systems[3](3206632) | Microsoft .NET Framework 4.6.2 | Important Information Disclosure | 3200970 |
Windows 10 Version 1607 for x64-based Systems[3](3206632) | Microsoft .NET Framework 4.6.2 | Important Information Disclosure | 3200970 |
Windows Server 2016 for x64-based Systems[3](3206632) | Microsoft .NET Framework 4.6.2 | Important Information Disclosure | 3200970 |
Server Core installation option | |||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Microsoft .NET Framework 4.6.2 (3204805) | Important Information Disclosure | None |
Windows Server 2012 (Server Core installation) | Microsoft .NET Framework 4.6.2 (3204801) | Important Information Disclosure | None |
Windows Server 2012 R2 (Server Core installation) | Microsoft .NET Framework 4.6.2 (3204802) | Important Information Disclosure | None |
Windows Server 2016 for x64-based Systems (Server Core installation)[3](3206632) | Microsoft .NET Framework 4.6.2 | Important Information Disclosure | 3200970 |
[1]Beginning with the October 2016 release, Microsoft has changed the update servicing model for Microsoft .NET Framework. For more information, please see this Microsoft .NET Blog Post.
[2]This number is the Parent package KB number. Users will be offered the Parent KB; however, the package KB numbers listed for each platform will be displayed in Add Remove Programs.
[3]Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. Please note that effective December 13, 2016, Windows 10 and Windows Server 2016 details for the Cumulative Updates will be documented in Release Notes. Please refer to the Release Notes for OS Build numbers, Known Issues, and affected file list information.
Note The vulnerability discussed in this bulletin affects Windows Server 2016 Technical Preview 5. Although an update is available for Windows Server 2016 Technical Preview 5 via Windows Update, Microsoft recommends that customers upgrade to Window Server 2016 at your earliest convenience.
Microsoft .NET Framework - Monthly Rollup Release[1]
Operating System | Component | .NET Information Disclosure Vulnerability - CVE-2016-7270 | Updates Replaced |
---|---|---|---|
Windows Vista and Windows Server 2008 Microsoft .NET Framework Updates for 2.0, 4.5.2, 4.6 (KB3210142) [2] | |||
Windows Vista | |||
Windows Vista for 32-bit Systems Service Pack 2 | Microsoft .NET Framework 2.0 Service Pack 2 (3210129) | Not applicable[4] | 3188744 in MS16-120 3163244 in MS16-091 |
Windows Vista for x64-based Systems Service Pack 2 | Microsoft .NET Framework 2.0 Service Pack 2 (3210129) | Not applicable[4] | 3188744 in MS16-120 3163244 in MS16-091 |
Windows Vista for 32-bit Systems Service Pack 2 | Microsoft .NET Framework 4.5.2 (3210139) | Not applicable[4] | 3188744 in MS16-120 |
Windows Vista for x64-based Systems Service Pack 2 | Microsoft .NET Framework 4.5.2 (3210139) | Not applicable[4] | 3188744 in MS16-120 |
Windows Vista for 32-bit Systems Service Pack 2 | Microsoft .NET Framework 4.6 (3210136) | Not applicable[4] | 3188744 in MS16-120 |
Windows Vista for x64-based Systems Service Pack 2 | Microsoft .NET Framework 4.6 (3210136) | Not applicable[4] | 3188744 in MS16-120 |
Windows Server 2008 | |||
Windows Server 2008 for 32-bit Systems Service Pack 2 | Microsoft .NET Framework 2.0 Service Pack 2 (3210129) | Not applicable[4] | 3188744 in MS16-120 3163244 in MS16-091 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Microsoft .NET Framework 2.0 Service Pack 2 (3210129) | Not applicable[4] | 3188744 in MS16-120 3163244 in MS16-091 |
Windows Server 2008 for Itanium-based Systems Service Pack 2 | Microsoft .NET Framework 2.0 Service Pack 2 (3210129) | Not applicable[4] | 3188744 in MS16-120 3163244 in MS16-091 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Microsoft .NET Framework 4.5.2 (3210139) | Not applicable[4] | 3188744 in MS16-120 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Microsoft .NET Framework 4.5.2 (3210139) | Not applicable[4] | 3188744 in MS16-120 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Microsoft .NET Framework 4.6 (3210136) | Not applicable[4] | 3188744 in MS16-120 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Microsoft .NET Framework 4.6 (3210136) | Not applicable[4] | 3188744 in MS16-120 |
Windows 7 and Windows Server 2008 R2 Microsoft .NET Framework Updates for 3.5.1, 4.5.2, 4.6,4.6.1, 4.6.2 (KB3205402) [2] | |||
Windows 7 | |||
Windows 7 for 32-bit Systems Service Pack 1 | Microsoft .NET Framework 3.5.1 (3210131) | Not applicable[4] | None |
Windows 7 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 3.5.1 (3210131) | Not applicable[4] | None |
Windows 7 for 32-bit Systems Service Pack 1 | Microsoft .NET Framework 4.5.2 (3210139) | Not applicable[4] | All previously released updates[4] |
Windows 7 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 4.5.2 (3210139) | Not applicable[4] | All previously released updates[4] |
Windows 7 for 32-bit Systems Service Pack 1 | Microsoft .NET Framework 4.6/4.6.1 (3210136) | Not applicable[4] | All previously released updates[4] |
Windows 7 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 4.6/4.6.1 (3210136) | Not applicable[4] | All previously released updates[4] |
Windows 7 for 32-bit Systems Service Pack 1 | Microsoft .NET Framework 4.6.2 (3205379) | Important Information Disclosure | None |
Windows 7 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 4.6.2 (3205379) | Important Information Disclosure | None |
Windows Server 2008 R2 | |||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 3.5.1 (3210131) | Not applicable[4] | None |
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 | Microsoft .NET Framework 3.5.1 (3210131) | Not applicable[4] | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 4.5.2 (3210139) | Not applicable[4] | All previously released updates[4] |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 4.6/4.6.1 (3210136) | Not applicable[4] | All previously released updates[4] |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Microsoft .NET Framework 4.6.2 (3205379) | Important Information Disclosure | None |
Windows Server 2012 Microsoft .NET Framework Updates for 3.5, 4.5.2, 4.6,4.6.1, 4.6.2 (KB3205403) [2] | |||
Windows Server 2012 | Microsoft .NET Framework 3.5 (3210130) | Not applicable[4] | None |
Windows Server 2012 | Microsoft .NET Framework 4.5.2 (3210138) | Not applicable[4] | All previously released updates[4] |
Windows Server 2012 | Microsoft .NET Framework 4.6/4.6.1 (3210133) | Not applicable[4] | All previously released updates[4] |
Windows Server 2012 | Microsoft .NET Framework 4.6.2 (3205377) | Important Information Disclosure | None |
Windows 8.1 and Windows Server 2012 R2 Microsoft .NET Framework Updates for 3.5, 4.5.2, 4.6,4.6.1, 4.6.2 (KB3205404) [2] | |||
Windows 8.1 | |||
Windows 8.1 for 32-bit Systems | Microsoft .NET Framework 3.5 (3210132) | Not applicable[4] | None |
Windows 8.1 for x64-based Systems | Microsoft .NET Framework 3.5 (3210132) | Not applicable[4] | None |
Windows 8.1 for 32-bit Systems | Microsoft .NET Framework 4.5.2 (3210137) | Not applicable[4] | All previously released updates[4] |
Windows 8.1 for x64-based Systems | Microsoft .NET Framework 4.5.2 (3210137) | Not applicable[4] | All previously released updates[4] |
Windows 8.1 for 32-bit Systems | Microsoft .NET Framework 4.6/4.6.1 (3210135) | Not applicable[4] | All previously released updates[4] |
Windows 8.1 for x64-based Systems | Microsoft .NET Framework 4.6/4.6.1 (3210135) | Not applicable[4] | All previously released updates[4] |
Windows 8.1 for 32-bit Systems | Microsoft .NET Framework 4.6.2 (3205378) | Important Information Disclosure | None |
Windows 8.1 for x64-based Systems | Microsoft .NET Framework 4.6.2 (3205378) | Important Information Disclosure | None |
Windows 8.1 RT | |||
Windows 8.1 RT | Microsoft .NET Framework 4.5.2 (3210137) | Not applicable[4] | All previously released updates[4] |
Windows 8.1 RT | Microsoft .NET Framework 4.6/4.6.1 (3210135) | Not applicable[4] | All previously released updates[4] |
Windows 8.1 RT | Microsoft .NET Framework 4.6.2 (3205378) | Important Information Disclosure | None |
Windows 2012 R2 | |||
Windows Server 2012 R2 | Microsoft .NET Framework 3.5 (3210132) | Not applicable[4] | None |
Windows Server 2012 R2 | Microsoft .NET Framework 4.5.2 (3210137) | Not applicable[4] | All previously released updates[4] |
Windows Server 2012 R2 | Microsoft .NET Framework 4.6/4.6.1 (3210135) | Not applicable[4] | All previously released updates[4] |
Windows Server 2012 R2 | Microsoft .NET Framework 4.6.2 (3205378) | Important Information Disclosure | None |
Windows 10 | |||
Windows 10 Version 1607 for 32-bit Systems[3](3206632) | Microsoft .NET Framework 4.6.2 | Important Information Disclosure | 3200970 |
Windows 10 Version 1607 for x64-based Systems[3](3206632) | Microsoft .NET Framework 4.6.2 | Important Information Disclosure | 3200970 |
Windows Server 2016 for x64-based Systems[3](3206632) | Microsoft .NET Framework 4.6.2 | Important Information Disclosure | 3200970 |
Server Core installation option | |||
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Microsoft .NET Framework 3.5.1 (3210131) | Not applicable[4] | None |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Microsoft .NET Framework 4.6/4.6.1 (3210136) | Not applicable[4] | All previously released updates[4] |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Microsoft .NET Framework 4.6.2 (3205379) | Important Information Disclosure | None |
Windows Server 2012 (Server Core installation) | Microsoft .NET Framework 3.5 (3210130) | Not applicable[4] | None |
Windows Server 2012 (Server Core installation) | Microsoft .NET Framework 4.5.2 (3210138) | Not applicable[4] | All previously released updates[4] |
Windows Server 2012 (Server Core installation) | Microsoft .NET Framework 4.6/4.6.1 (3210133) | Not applicable[4] | All previously released updates[4] |
Windows Server 2012 (Server Core installation) | Microsoft .NET Framework 4.6.2 (3205377) | Important Information Disclosure | None |
Windows Server 2012 R2 (Server Core installation) | Microsoft .NET Framework 3.5 (3210132) | Not applicable[4] | None |
Windows Server 2012 R2 (Server Core installation) | Microsoft .NET Framework 4.5.2 (3210137) | Not applicable[4] | All previously released updates[4] |
Windows Server 2012 R2 (Server Core installation) | Microsoft .NET Framework 4.6/4.6.1 (3210135) | Not applicable[4] | All previously released updates[4] |
Windows Server 2012 R2 (Server Core installation) | Microsoft .NET Framework 4.6.2 (3205378) | Important Information Disclosure | None |
Windows Server 2016 for x64-based Systems (Server Core installation)[3](3206632) | Microsoft .NET Framework 4.6.2 | Important Information Disclosure | 3200970 |
[1]Beginning with the October 2016 release, Microsoft has changed the update servicing model for Microsoft .NET Framework. For more information, please see this Microsoft .NET Blog Post.
[2] This number is the Parent package KB number. Users will be offered the Parent KB; however, the package KB numbers listed for each platform will be displayed in Add Remove Programs.
[3]Windows 10 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. Please note that effective December 13, 2016, Windows 10 and Windows Server 2016 details for the Cumulative Updates will be documented in Release Notes. Please refer to the Release Notes for OS Build numbers, Known Issues, and affected file list information.
[4]Microsoft .NET Framework 2.0, 4.5.2 and 4.6/4.6.1 are rollup patches and include all previous updates as well as this month’s updates. Please see This Page for more information.
Note The vulnerability discussed in this bulletin affects Windows Server 2016 Technical Preview 5. An update is available for Windows Server 2016 Technical Preview 5 via Windows Update. To be protected from the vulnerability, Microsoft recommends that customers running Windows Server 2016 Technical Preview 5 upgrade to Windows Server 2016.
Vulnerability Information
.NET Framework Information Disclosure Vulnerabiltiy - CVE-2016-7270
An information disclosure vulnerability exists in Microsoft .NET 4.6.2 Framework’s Data Provider for SQL Server that could allow an attacker to access information that should be defended by the Always Encrypted feature. The vulnerability is caused when .NET Framework improperly uses a developer-supplied key. When this key is misused, it is also possible for access to data to be temporarily lost.
To exploit the vulnerability, an attacker who can access the incorrectly encrypted data could attempt to decrypt the data using an easily guessable key.
The security update addresses the vulnerability by correcting the way .NET Framework handles the developer-supplied key, and thus properly defends the data.
The following table contains a link to the standard entry for the vulnerability in the Common Vulnerabilities and Exposures list:
Vulnerability title | CVE number | Publicly disclosed | Exploited |
---|---|---|---|
.NET Framework Information Disclosure Vulnerabiltiy | CVE-2016-7270 | Yes | No |
Mitigating Factors
Microsoft has not identified any mitigating factors for this vulnerability.
Workarounds
The following workarounds may be helpful in your situation:
Column key encryption (CEK) can be turned off by setting the SqlConnection.ColumnEncryptionKeyCacheTtl property to TimeSpan.Zero in the .Net framework 4.6.2 driver. Please see TimeSpan.Zero Field for more information.
Security Update Deployment
For Security Update Deployment information, see the Microsoft Knowledge Base article referenced in the Executive Summary.
Acknowledgments
Microsoft recognizes the efforts of those in the security community who help us protect customers through coordinated vulnerability disclosure. See Acknowledgments for more information.
Disclaimer
The information provided in the Microsoft Knowledge Base is provided “as is” without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
Revisions
V1.0 (December 13, 2016) Bulletin Published.
V1.1 (December 19, 2016): Revised bulletin with the following corrections:
- Changed the vulnerability severity rating for the Microsoft .NET Security and Quality Rollup updates that apply to Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, and 4.6.1 to Not applicable, because these versions of .NET Framework are not affected by the vulnerability described in this bulletin.
- Removed Windows RT from the Security Only Release affected software table because it is not supported for the Security Only release.
- Corrected the Updates Replaced entries for update 3210142 in the Monthly Rollup Release affected software table by removing update 3188736 as a superseded update.
V2.0 (December 19, 2016): Revised bulletin to announce that Security and Quality Rollup updates 3210142 and 3205402 have been rereleased with a detection change for WSUS customers that removes a supersedence relationship between these and previously released October Security-Only updates 3188736 and 3188730, respectively. These are detection changes only. There were no changes to the update files. Customers who have already successfully installed any of these updates do not need to take any action. For more information, see the Microsoft Knowledge Base article for the respective update.
In addition, revised bulletin to announce that update 3210142 is available for Windows Server 2008 for Itanium-based Systems Service Pack 2, and that update 3205402 is available for Windows Server 2008 R2 for Itanium-based Systems Service Pack 1. Customers should apply the applicable updates to be protected from the vulnerabilities discussed in this bulletin. The majority of customers have automatic updating enabled and will not need to take any action because the updates will be downloaded and installed automatically.
- V2.1 (February 23, 2017): Revised bulletin to announce a detection logic change to Monthly Rollup Release KB3205403 and Monthly Rollup Release KB3205404. This is an informational change only. Customers who have already successfully updated their systems do not need to take any action.
Page generated 2017-02-23 12:54-08:00.