Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Security Only Update for .NET Framework 4.8 for Windows Server 2012 (KB4552961)


View products that this article applies to.

↑ Back to the top


Summary

A remote code execution vulnerability exists in .NET Framework software when the software fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of .NET Framework. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. The security update addresses the vulnerability by correcting how .NET Framework checks the source markup of a file.

To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).

A denial of service vulnerability exists when .NET Framework improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET Framework web application. The vulnerability can be exploited remotely, without authentication. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application. The update addresses the vulnerability by correcting how the .NET Framework web application handles web requests.

To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).

↑ Back to the top


Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.
  • 4556404 Description of the Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Server 2012 (KB4556404)

↑ Back to the top


How to obtain and install the update

Method 1: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 2: Windows Software Update Services (WSUS)

On your WSUS server, follow these steps:

  1. Select Start, select Administrative Tools, and then select Microsoft Windows Server Update Services 3.0.
  2. Expand ComputerName, and then select Action.
  3. Select Import Updates.
  4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.
  5. After the ActiveX control is installed, you see the Microsoft Update Catalog screen. Type 4556404 into the Search box, and then select Search.
  6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Select Add to add them to your basket.
  7. After you select all the packages that you require, select View Basket.
  8. To import the packages to your WSUS server, select Import.
  9. After the packages are imported, select Close to return to WSUS.

The updates are now available for installation through WSUS.

↑ Back to the top


Prerequisites

To apply this update, you must have .NET Framework 4.8 installed.

Restart requirement

You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

Update deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

20200512 Security update deployment information: May 12, 2020

Update removal information

Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.

Update restart information

This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.

↑ Back to the top


File information

File hash information
File nameSHA1 hashSHA256 hash
Windows8-RT-KB4552961-x64-NDP48.msu4E40802E269FE7D52DB77E53254553D4C348BB66B0C3BDF8481571D13270C82F3AE2F62382B2B57FFA07F1500C8D5B32D280A74D

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2012 file information
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Mscorlib.dll4.8.4180.05,439,26426-Mar-202023:10x64NoneNot applicable
Normidna.nlpNot applicable59,34202-Aug-201801:29Not applicableNoneNot applicable
Normnfc.nlpNot applicable47,07602-Aug-201801:29Not applicableNoneNot applicable
Normnfd.nlpNot applicable40,56602-Aug-201801:29Not applicableNoneNot applicable
Normnfkc.nlpNot applicable67,80802-Aug-201801:29Not applicableNoneNot applicable
Normnfkd.nlpNot applicable61,71802-Aug-201801:29Not applicableNoneNot applicable
Clrjit.dll4.8.4180.01,365,27226-Mar-202023:10x64NoneNot applicable
Clr.dll4.8.4180.011,251,19226-Mar-202023:10x64NoneNot applicable
Compatjit.dll4.8.4180.01,280,80026-Mar-202023:10x64NoneNot applicable
Globalmonospace.compositefontNot applicable26,04031-Jul-201902:08Not applicableSPAAMD64_NETFX4-GLOBALMONOSP
Globalsansserif.compositefontNot applicable26,48931-Jul-201902:08Not applicableNoneNot applicable
Globalserif.compositefontNot applicable29,77931-Jul-201902:08Not applicableNoneNot applicable
Globaluserinterface.compositefontNot applicable264,98603-Feb-202010:17Not applicableNoneNot applicable
Mscordacwks.dll4.8.4180.01,808,67226-Mar-202023:10x64NoneNot applicable
Mscordbi.dll4.8.4180.01,662,75226-Mar-202023:10x64NoneNot applicable
Mscoreei.dll4.8.4180.0689,95226-Mar-202023:10x64NoneNot applicable
Penimc.dll14.8.4180.019,23226-Mar-202023:10x64NoneNot applicable
Penimc2_v0400.dll4.8.4180.0128,28826-Mar-202023:10x64NoneNot applicable
Penimc_v0400.dll4.8.4180.027,93626-Mar-202023:10x64NoneNot applicable
Peverify.dll4.8.4180.0273,18426-Mar-202023:10x64NoneNot applicable
Presentationframework-systemdata.dll4.8.4180.025,37626-Mar-202023:11x86NoneNot applicable
Presentationframework.dll4.8.4180.06,271,26426-Mar-202023:11x86NoneNot applicable
Presentationhost_v0400.dll.mui4.8.4180.085,28026-Mar-202023:10Not applicableNoneNot applicable
Presentationhost_v0400.dll4.8.4180.0310,04826-Mar-202023:10x64NoneNot applicable
Presentationnative_v0400.dll4.8.4180.01,171,74426-Mar-202023:10x64NoneNot applicable
Servicemodel.mofNot applicable88,38303-Feb-202013:12Not applicableNoneNot applicable
Servicemodel.mof.uninstallNot applicable89603-Feb-202013:12Not applicableNoneNot applicable
Servicemonikersupport.dll4.8.4180.035,10426-Mar-202023:10x64NoneNot applicable
Smdiagnostics.dll4.8.4180.073,88026-Mar-202023:11x86NoneNot applicable
Sos.dll4.8.4180.0929,05626-Mar-202023:10x64NoneNot applicable
System.activities.dll4.8.4180.01,534,31226-Mar-202023:11x86NoneNot applicable
System.core.dll4.8.4180.01,556,83226-Mar-202023:11x86NoneNot applicable
System.identitymodel.services.dll4.8.4180.0199,15226-Mar-202023:11x86NoneNot applicable
System.identitymodel.dll4.8.4180.01,094,50426-Mar-202023:11x86NoneNot applicable
System.runtime.serialization.dll4.8.4180.01,054,87226-Mar-202023:11x86NoneNot applicable
System.servicemodel.channels.dll4.8.4180.0158,70426-Mar-202023:11x86NoneNot applicable
System.servicemodel.discovery.dll4.8.4180.0309,02426-Mar-202023:11x86NoneNot applicable
System.servicemodel.internals.dll4.8.4180.0254,09626-Mar-202023:11x86NoneNot applicable
System.servicemodel.washosting.dll4.8.4180.040,73626-Mar-202023:11x86NoneNot applicable
System.servicemodel.dll4.8.4180.06,389,33626-Mar-202023:11x86NoneNot applicable
System.windows.controls.ribbon.dll4.8.4180.0751,39226-Mar-202023:11x86NoneNot applicable
System.xaml.dll4.8.4180.0640,05626-Mar-202023:11x86NoneNot applicable
Uiautomationclientsideproviders.dll4.8.4180.0361,76026-Mar-202023:11x86NoneNot applicable
Uiautomationclient.dll4.8.4180.0178,46426-Mar-202023:11x86NoneNot applicable
Uiautomationprovider.dll4.8.4180.049,64826-Mar-202023:11x86NoneNot applicable
Uiautomationtypes.dll4.8.4180.0223,51226-Mar-202023:11x86NoneNot applicable
Windowsbase.dll4.8.4180.01,306,39226-Mar-202023:11x86NoneNot applicable
Wpfgfx_v0400.dll4.8.4180.02,058,01626-Mar-202023:10x64NoneNot applicable
Globalmonospace.compositefontNot applicable26,04003-Feb-202013:25Not applicableNoneNot applicable
Globalsansserif.compositefontNot applicable26,48903-Feb-202013:25Not applicableNoneNot applicable
Globalserif.compositefontNot applicable29,77903-Feb-202013:25Not applicableNoneNot applicable
Globaluserinterface.compositefontNot applicable264,98603-Feb-202013:25Not applicableNoneNot applicable
Presentationcore.dll4.8.4180.03,652,38426-Mar-202023:10x64NoneNot applicable
Presentationframework-systemdata.dll4.8.4180.025,37626-Mar-202023:11x86NoneNot applicable
Presentationframework.dll4.8.4180.06,271,26426-Mar-202023:11x86NoneNot applicable
Smdiagnostics.dll4.8.4180.073,88026-Mar-202023:11x86NoneNot applicable
System.activities.dll4.8.4180.01,534,31226-Mar-202023:11x86NoneNot applicable
System.core.dll4.8.4180.01,556,83226-Mar-202023:11x86NoneNot applicable
System.identitymodel.services.dll4.8.4180.0199,15226-Mar-202023:11x86NoneNot applicable
System.identitymodel.dll4.8.4180.01,094,50426-Mar-202023:11x86NoneNot applicable
System.runtime.serialization.dll4.8.4180.01,054,87226-Mar-202023:11x86NoneNot applicable
System.servicemodel.channels.dll4.8.4180.0158,70426-Mar-202023:11x86NoneNot applicable
System.servicemodel.discovery.dll4.8.4180.0309,02426-Mar-202023:11x86NoneNot applicable
System.servicemodel.internals.dll4.8.4180.0254,09626-Mar-202023:11x86NoneNot applicable
System.servicemodel.washosting.dll4.8.4180.040,73626-Mar-202023:11x86NoneNot applicable
System.servicemodel.dll4.8.4180.06,389,33626-Mar-202023:11x86NoneNot applicable
System.windows.controls.ribbon.dll4.8.4180.0751,39226-Mar-202023:11x86NoneNot applicable
System.xaml.dll4.8.4180.0640,05626-Mar-202023:11x86NoneNot applicable
Uiautomationclientsideproviders.dll4.8.4180.0361,76026-Mar-202023:11x86NoneNot applicable
Uiautomationclient.dll4.8.4180.0178,46426-Mar-202023:11x86NoneNot applicable
Uiautomationprovider.dll4.8.4180.049,64826-Mar-202023:11x86NoneNot applicable
Uiautomationtypes.dll4.8.4180.0223,51226-Mar-202023:11x86NoneNot applicable
Windowsbase.dll4.8.4180.01,306,39226-Mar-202023:11x86NoneNot applicable
Mscorlib.dll4.8.4180.05,678,57626-Mar-202023:11x86NoneNot applicable
Normidna.nlpNot applicable59,34202-Aug-201801:29Not applicableNoneNot applicable
Normnfc.nlpNot applicable47,07602-Aug-201801:29Not applicableNoneNot applicable
Normnfd.nlpNot applicable40,56602-Aug-201801:29Not applicableNoneNot applicable
Normnfkc.nlpNot applicable67,80802-Aug-201801:29Not applicableNoneNot applicable
Normnfkd.nlpNot applicable61,71802-Aug-201801:29Not applicableNoneNot applicable
Clrjit.dll4.8.4180.0561,64826-Mar-202023:11x86NoneNot applicable
Clr.dll4.8.4180.08,044,83226-Mar-202023:11x86NoneNot applicable
Globalmonospace.compositefontNot applicable26,04031-Jul-201902:08Not applicableSPAX86_NETFX4-GLOBALMONOSP
Globalsansserif.compositefontNot applicable26,48931-Jul-201902:08Not applicableNoneNot applicable
Globalserif.compositefontNot applicable29,77931-Jul-201902:08Not applicableNoneNot applicable
Globaluserinterface.compositefontNot applicable264,98603-Feb-202010:17Not applicableNoneNot applicable
Mscordacwks.dll4.8.4180.01,315,10426-Mar-202023:11x86NoneNot applicable
Mscordbi.dll4.8.4180.01,196,32026-Mar-202023:11x86NoneNot applicable
Mscoreei.dll4.8.4180.0581,92026-Mar-202023:11x86NoneNot applicable
Penimc.dll14.8.4180.019,23226-Mar-202023:11x86NoneNot applicable
Penimc2_v0400.dll4.8.4180.0107,50426-Mar-202023:11x86NoneNot applicable
Penimc_v0400.dll4.8.4180.026,09626-Mar-202023:11x86NoneNot applicable
Peverify.dll4.8.4180.0190,23226-Mar-202023:11x86NoneNot applicable
Presentationhost_v0400.dll.mui4.8.4180.085,27226-Mar-202023:11Not applicableNoneNot applicable
Presentationhost_v0400.dll4.8.4180.0241,64826-Mar-202023:11x86NoneNot applicable
Presentationnative_v0400.dll4.8.4180.0930,80826-Mar-202023:11x86NoneNot applicable
Servicemonikersupport.dll4.8.4180.032,27226-Mar-202023:11x86NoneNot applicable
Sos.dll4.8.4180.0774,94426-Mar-202023:11x86NoneNot applicable
System.core.dll4.8.4180.01,556,83226-Mar-202023:11x86NoneNot applicable
Wpfgfx_v0400.dll4.8.4180.01,626,60826-Mar-202023:11x86NoneNot applicable
Globalmonospace.compositefontNot applicable26,04031-Jul-201902:08Not applicableNoneNot applicable
Globalsansserif.compositefontNot applicable26,48931-Jul-201902:08Not applicableNoneNot applicable
Globalserif.compositefontNot applicable29,77931-Jul-201902:08Not applicableNoneNot applicable
Globaluserinterface.compositefontNot applicable264,98603-Feb-202010:17Not applicableNoneNot applicable
Presentationcore.dll4.8.4180.03,676,44026-Mar-202023:11x86NoneNot applicable

↑ Back to the top


Information about protection and security

↑ Back to the top


Keywords: Vulnerabilities/exploits/security bulletins, kbContentAuto, kbSupportTopic, atdownload, kbbug, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew, kb, kbexpertiseinter

↑ Back to the top

Article Info
Article ID : 4552961
Revision : 10
Created on : 5/11/2020
Published on : 5/12/2020
Exists online : False
Views : 154