

SummaryĪ remote code execution vulnerability exists in Visual Studio software if the software does not check the source markup of a file for an unbuilt project. Additionally, the dates and the times may change when you perform certain operations on the files.Starting on March 10, 2020, Microsoft Update is now offering this security update to additional versions of the Windows OS. The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. Deployment informationįor deployment details for this security update, see the following Knowledge Base article: This security update doesn't replace other security updates.

You may have to restart the computer after you apply this security update if an instance of Visual Studio is being used. To apply this security update, you must have Visual Studio 2012 Update 5 installed. To get the standalone package for this update, go to the Microsoft Update Catalog website. The following file is available for download:ĭownload the hotfix package now. How to obtain and install the update Method 1: Microsoft Download SummaryĪ remote code execution vulnerability exists in Microsoft Visual Studio 2012 when it incorrectly handles objects in memory. Note This security update applies to Visual Studio 2012 Update 5 except for Visual Studio Isolated and Integrated Shells, Build Tools, Remote Tools, and Express for Web.
