Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Security Only Update for .NET Framework 3.5 for Windows Server 2012 (KB4569734)


View products that this article applies to.

↑ Back to the top


Summary

Security improvements

An elevation of privilege vulnerability exists when ASP.NET or .NET Framework web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET Framework handle requests.

To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).

A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. To exploit the vulnerability, an attacker would need to be able to upload a specially crafted file to a web application. The security update addresses the vulnerability by correcting how .NET Framework processes input.

For more information go to: https://go.microsoft.com/fwlink/?linkid=2138023

To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).

↑ Back to the top


Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.
  • 4570501 Description of the Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Server 2012 (KB4570501)

↑ Back to the top


How to obtain and install the update

Before installing this update

Prerequisite:

To apply this update, you must have .NET Framework 3.5 installed.

Install this update

Release Channel Available Next Step
Microsoft Update Catalog Yes To get the standalone package for this update, go to the Microsoft Update Catalog website.
Windows Server Update Services (WSUS) Yes

This update will automatically sync with WSUS if you configure Products and Classifications as follows:

Product:Windows Server 2012

Classification: Security Updates

↑ Back to the top


Prerequisites

To apply this update, you must have .NET Framework 3.5 installed.

Restart requirement

You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

Update deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

20200811 Security update deployment information: August 11, 2020

Update removal information

Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.

Update restart information

This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.

↑ Back to the top


File information

File hash information
File nameSHA1 hashSHA256 hash
Windows8-RT-KB4569734-x64.msuE87D23055253C0A2E8D4B83CC20DE9A7093CE40CC08485E7B22C297EC402B508519EC783F44A5167AD522DC5711477F0DDEC5E2E

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2012 file information
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Aspnet_wp.exe2.0.50727.895145,45601-Jul-202013:06x64SPNAMD64_NETFX-ASP
System.web.regularexpressions.dll2.0.50727.895198,30401-Jul-202013:06x86NoneNot applicable
Webengine.dll2.0.50727.8951748,93601-Jul-202013:06x64NoneNot applicable
System.web.dll2.0.50727.89515,300,22401-Jul-202013:06x64NoneNot applicable
System.web.regularexpressions.dll2.0.50727.895198,30401-Jul-202013:06x86NoneNot applicable
Aspnet_wp.exe2.0.50727.895133,68001-Jul-202013:06x86SPNX86_NETFX-ASP
Webengine.dll2.0.50727.8951439,68001-Jul-202013:06x86NoneNot applicable
System.web.dll2.0.50727.89515,292,03201-Jul-202013:06x86NoneNot applicable

↑ Back to the top


Information about protection and security

↑ Back to the top


Keywords: Vulnerabilities/exploits/security bulletins, kbContentAuto, kbSupportTopic, atdownload, kbbug, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew, kb, kbexpertiseinter

↑ Back to the top

Article Info
Article ID : 4569734
Revision : 7
Created on : 8/10/2020
Published on : 8/11/2020
Exists online : False
Views : 219