Active Scan. Scan your PC free
Premium Services
Premium Services

Virus Encyclopedia

Welcome to the Virus Encyclopedia of Panda Security.


Threat LevelLow threatDamageHighDistributionNot widespread


MS10-060 is not categorized as virus, worm, Trojan or backdoor. It is a group of critical vulnerabilities in the .NET Common Language Runtime and Silverlight, which allows arbitrary code to be remotely executed in the vulnerable computer.

The Common Language Runtime (CLR) is a run-time environment provided by the .NET Framework which makes the development process easier.

The affected components are:

  • .NET Framework 3.5.1 on Windows 2008 R2/7.
  • .NET Framework 3.5 on Windows 2008/Vista/2003/XP.
  • .NET Framework 2.0 on Windows 2008/Vista/2003/XP.
  • Silverlight 2 and 3.

The addressed vulnerabilities are:

  • Microsoft Silverlight Memory Corruption  vulnerability. it occurs due to the way that Silverlight handles pointers.
  • Microsoft Silverlight and Microsoft .NET Framework CLR Virtual Method Delegate vulnerability: it occurs due to the way in which the .NET Common Language Runtime (CLR) handles delegates to virtual methods.

If exploited successfully, this vulnerability allows hackers to gain remote control of the affected computer with the same privileges as the logged on user. If this user had administrator rights, the hacker could take complete control of the system: create, modify or delete files, install programs, create new user accounts, etc.

This vulnerability can be exploited using different means:

  • By hosting a specially crafted website that contains a specially crafted XBAP (XAML browser application) and enticing users to visit it.
  • By uploading a malicious ASP.NET application to a web hosting environment.
  • By placing a malicious .NET Framework application on a network share and enticing users to execute it.


If you have any of the vulnerable components, it is recommended to download and apply the security patch for this vulnerability. Click here to access the web page for downloading the patch.

Bear in mind that this security bulletin replaces a previous one, called MS09-061.