Applies to:
Microsoft .NET Framework 3.5.1
Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.
View products that this article applies to.
IMPORTANT Verify that you have installed the required updates listed in the How to get this update section before installing this update.
IMPORTANT Some customers who use Windows Server 2008 R2 SP1 and have activated their ESU multiple activation key (MAK) add-on before installing the January 14, 2020 updates might need to re-activate their key. Re-activation on the affected devices should only be required once. For information on activation, see this blog post.
IMPORTANT WSUS scan cab files will continue to be available for Windows 7 SP1 and Windows Server 2008 R2 SP1. If you have a subset of devices running these operating systems without ESU, they might show as non-compliant in your patch management and compliance toolsets.
IMPORTANT Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in KB4522133 to continue receiving security updates after extended support ends on January 14, 2020. For more information on ESU and which editions are supported, see KB4497181.
IMPORTANT Starting on January 15, 2020, a full-screen notification will appear that describes the risk of continuing to use Windows 7 Service Pack 1 after it reaches end of support on January 14, 2020. The notification will remain on the screen until you interact with it. This notification will only appear on the following editions of Windows 7 Service Pack 1:
Note The notification will not appear on domain-joined machines or machines in kiosk mode.
Security improvements
An elevation of privilege vulnerability exists when ASP.NET or .NET Framework web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET Framework handle requests.
To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).
A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. To exploit the vulnerability, an attacker would need to be able to upload a specially crafted file to a web application. The security update addresses the vulnerability by correcting how .NET Framework processes input.
For more information go to: https://go.microsoft.com/fwlink/?linkid=2138023
To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).
Before installing this update
Prerequisite:
To apply this update, you must have .NET Framework 3.5.1 installed.
You must install the updates listed below and restart your device before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.
Install this update
Release Channel | Available | Next Step |
Microsoft Update Catalog | Yes | To get the standalone package for this update, go to the Microsoft Update Catalog website. |
Windows Server Update Services (WSUS) | Yes | This update will automatically sync with WSUS if you configure Products and Classifications as follows: Product: Windows 7 Service Pack 1, Windows Server 2008 R2 Service Pack 1,Windows Embedded Standard 7 Service Pack 1, Windows Embedded POSReady 7 Classification: Security Updates |
You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
20200811 Security update deployment information: August 11, 2020
Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.
This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.
File name | SHA1 hash | SHA256 hash |
---|---|---|
Windows6.1-KB4569736-x64.msu | 0BD4A25D7E6DCB744D6D0D98DA096564079A3DC8 | EDA8D3ABBAD3325349FC27C54C9F6488E402F949D62F71CD8D21AFDE61661645 |
Windows6.1-KB4569736-x86.msu | CFE06928D60254EE4045DDBD0A90DF95C72D90B6 | 64097A53527B2303BA4353F6299E5FDDA62A55DB517E2DA761C0634F69FBCFB3 |
The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
File name | File version | File size | Date | Time | Platform | SP requirement | Service branch |
Aspnet_wp.exe | 2.0.50727.8951 | 45,456 | 16-Jul-2020 | 00:28 | x64 | SPN | AMD64_NETFX-ASP |
System.web.regularexpressions.dll | 2.0.50727.8951 | 98,304 | 16-Jul-2020 | 00:28 | x86 | None | Not applicable |
Webengine.dll | 2.0.50727.8951 | 748,936 | 16-Jul-2020 | 00:28 | x64 | None | Not applicable |
System.web.dll | 2.0.50727.8951 | 5,300,224 | 16-Jul-2020 | 00:28 | x64 | None | Not applicable |
System.web.regularexpressions.dll | 2.0.50727.8951 | 98,304 | 16-Jul-2020 | 00:29 | x86 | None | Not applicable |
Aspnet_wp.exe | 2.0.50727.8951 | 33,680 | 16-Jul-2020 | 00:29 | x86 | SPN | X86_NETFX-ASP |
Webengine.dll | 2.0.50727.8951 | 439,680 | 16-Jul-2020 | 00:29 | x86 | None | Not applicable |
System.web.dll | 2.0.50727.8951 | 5,292,032 | 16-Jul-2020 | 00:29 | x86 | None | Not applicable |
File name | File version | File size | Date | Time | Platform | SP requirement | Service branch |
System.web.regularexpressions.dll | 2.0.50727.8951 | 98,304 | 16-Jul-2020 | 00:29 | x86 | None | Not applicable |
Aspnet_wp.exe | 2.0.50727.8951 | 33,680 | 16-Jul-2020 | 00:29 | x86 | SPN | X86_NETFX-ASP |
Webengine.dll | 2.0.50727.8951 | 439,680 | 16-Jul-2020 | 00:29 | x86 | None | Not applicable |
System.web.dll | 2.0.50727.8951 | 5,292,032 | 16-Jul-2020 | 00:29 | x86 | None | Not applicable |
Keywords: Vulnerabilities/exploits/security bulletins, kbContentAuto, kbSupportTopic, atdownload, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew, kb, kbbug