Applies To.NET

Applies to:

Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.7.1 Microsoft .NET Framework 4.7.2

Note:

Revised Jun 15, 2023 to correct the wording of the known issue to X.509 certificate

Revised on Jun 20, 2023 to fix the link for CVE-2023-32030

REMINDER Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 have reached the end of mainstream support and are now in extended security update (ESU) support.

Starting in July 2020, there will no longer be optional, non-security releases (known as "C" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the "B" or Update Tuesday release).

Verify that you have installed the required updates listed in the How to get this update section before installing this update. 

Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in KB4522133 to continue receiving security updates after extended support ends on January 14, 2020. For more information on ESU and which editions are supported, see KB4497181. For more information, see the ESU blog.

REMINDER All updates for .NET Framework 4.7.2, 4.7.1, 4.7, 4.6.2, 4.6.1, and 4.6 require that the d3dcompiler_47.dll update is installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll, see KB 4019990.

If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

The June 13, 2023 update for Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 and Windows Server 2008 SP2 includes security improvements in .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2. We recommend that you apply this update as part of your regular maintenance routines. Verify that you have installed the required updates listed in the How to get this update section before installing this update.

Summary

CVE-2023-24897 - .NET Framework Remote Code Execution Vulnerability This security update addresses a vulnerability in the MSDIA SDK where corrupted PDBs can cause heap overflow, leading to a crash or remove code execution. For more information see CVE-2023-24897.

CVE-2023-24895 - .NET Framework Remote Code Execution Vulnerability This security update addresses a vulnerability in the WPF XAML parser where an unsandboxed parser can lead to remote code execution. For more information see CVE-2023-24895.

CVE-2023-24936 - .NET Framework Elevation of Privilege Vulnerability This security update addresses a vulnerability in bypass restrictions when deserializing a DataSet or DataTable from XML, leading to an elevation of privilege. For more information see CVE-2023-24936.

CVE-2023-29331 - .NET Framework Denial of Service Vulnerability This security update addresses a vulnerability where the AIA fetching process for client certificates can lead to denial of service. For more information see CVE 2023-29331.

CVE-2023-32030 - .NET Framework Denial of Service Vulnerability This security update addresses a vulnerability where X509Certificate2 file handling can lead to denial of service. For more information see CVE-2023-32030.

Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.

  • 5027534 Description of the Security Only Update for .NET Framework 2.0, 3.0, 4.6.2 for Windows Server 2008 SP2 (KB5027534)

  • 5027531 Description of the Security Only Update for .NET Framework 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 (KB5027531)

Known issues in this update

Symptom

This update may impact how .NET Framework runtime imports X.509 Certificates. For more information about this issue, see KB5025823

Workaround

To mitigate this issue, see KB5025823.

How to get this update

Before installing this update

Prerequisite:

To apply this update, you must have .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2 installed.

You must install the updates listed below and restart your device before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.

Operating System

Prerequisites for installing this update

Windows Server 2008 SP2

  1. The April 9, 2019 servicing stack update (SSU) (KB4493730). To get the standalone package for this SSU, search for it in the Microsoft Update Catalog. This update is required to install updates that are only SHA-2 signed.

  2. The latest SHA-2 update (KB4474419) released October 8, 2019 or newer update. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.

  3. To get this security update, you must reinstall the "Extended Security Updates (ESU) Licensing Preparation Package" (KB5016891) for Windows Server 2008 SP2 that is dated August 8, 2022 even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the Microsoft Update Catalog.

  4. After you install the items above, we strongly recommend that you install the latest SSU. For Windows Server 2008 SP2, you must have the servicing stack update (SSU) (KB5016129) that is dated July 12, 2022 or later installed. For more information about the latest SSU updates, see ADV990001 | Latest Servicing Stack Updates. If you use Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog. For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.

  5. Download the ESU MAK add-on key from the VLSC portal and deploy and activate the ESU MAK add-on key. If you use the Volume Activation Management Tool  (VAMT) to deploy and activate keys, follow the instructions here.

    IMPORTANT You do not need an additional key for deployment of the following:

    • You do not need to deploy an additional ESU key for Azure virtual machines (VMs), Azure Stack HCI, version 21H2 and later.

    • For other Azure products such as Azure VMWare, Azure Nutanix solution Azure Stack (Hub, Edge), or for bring-your-own images on Azure for Windows Server 2008 SP2, you do need to deploy the ESU key.  The steps to install, activate, and deploy ESUs are the same for the fourth year of ESU coverage.

Windows Embedded 7 Standard and Windows Server 2008 R2

  1. The March 12, 2019 servicing stack update (SSU) (KB4490628). To get the standalone package for this SSU, search for it in the Microsoft Update Catalog. This update is required to install updates that are only SHA-2 signed.

  2. The latest SHA-2 update (KB4474419) released September 10, 2019 or newer update. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.

  3. To get this security update, you must reinstall the "Extended Security Updates (ESU) Licensing Preparation Package" (KB5016892) for Windows Server 2008 R2 SP1 that is dated August 8, 2022 even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the Microsoft Update Catalog.

  4. After you install the items above, we strongly recommend that you install the latest SSU.

    ​​​​​​​For Windows Server 2008 R2 SP1, you must have the servicing stack update (SSU) (KB5017397) that is dated September 13, 2022 or later installed. For more information about the latest SSU updates, see ADV990001 | Latest Servicing Stack Updates. If you use Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog. For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.

  5. Download the ESU MAK add-on key from the VLSC portal and deploy and activate the ESU MAK add-on key. If you use the Volume Activation Management Tool  (VAMT) to deploy and activate keys, follow the instructions here.

    IMPORTANT You do not need an additional key for deployment of the following:

    • You do not need to deploy an additional ESU key for Azure virtual machines (VMs), Azure Stack HCI.

    • For other Azure products such as Azure VMWare, Azure Nutanix solution Azure Stack (Hub, Edge), or for bring-your-own images on Azure for Windows Server 2008 SP2, and Windows Server 2008 R2 SP1 you do need to deploy the ESU key.  The steps to install, activate, and deploy ESUs are the same for the fourth year of ESU coverage.

Install this update

Release Channel

Available

Next Step

Windows Update and Microsoft Update

No

See the other options below.

Microsoft Update Catalog

Yes

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Windows Server Update Services (WSUS)

Yes

This individual .NET Framework product update will be installed, as applicable, by applying the operating system update. For more information about operating system updates see additional information about this update section.

Restart requirement

You may need to restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

Update deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

20230613 Security update deployment information: June 13, 2023

File Information

x86

File name

File version

File size

Date

Time

clr.dll

4.7.4050.0

7,773,576

08-May-2023

21:09

clrjit.dll

4.7.4050.0

517,016

08-May-2023

21:09

diasymreader.dll

14.7.4050.0

1,067,928

08-May-2023

21:09

GlobalUserInterface.CompositeFont

186,009

08-May-2023

21:09

mscordacwks.dll

4.7.4050.0

1,336,752

08-May-2023

21:09

mscordbi.dll

4.7.4050.0

1,162,616

08-May-2023

21:09

mscorlib.dll

4.7.4050.0

5,704,600

08-May-2023

21:09

msvcp120_clr0400.dll

12.0.52519.0

485,576

08-May-2023

21:09

msvcr120_clr0400.dll

12.0.52519.0

987,840

08-May-2023

21:09

VsVersion.dll

14.7.4050.0

13,208

08-May-2023

21:09

peverify.dll

4.7.4050.0

182,704

08-May-2023

21:09

PresentationCore.dll

4.7.4050.0

3,638,160

08-May-2023

21:09

PresentationFramework.dll

4.7.4050.0

6,269,888

08-May-2023

21:09

PresentationFramework-SystemData.dll

4.7.4050.0

18,328

08-May-2023

21:09

PresentationHost_v0400.dll

4.7.4050.0

208,280

08-May-2023

21:09

PresentationHost_v0400.dll.mui

4.7.4050.0

78,744

08-May-2023

21:09

PresentationNative_v0400.dll

4.7.4050.0

821,144

08-May-2023

21:09

SOS.dll

4.7.4050.0

737,192

08-May-2023

21:09

System.Core.dll

4.7.4050.0

1,547,120

08-May-2023

21:09

System.Data.dll

4.7.4050.0

3,468,184

08-May-2023

21:09

System.dll

4.7.4050.0

3,559,736

08-May-2023

21:09

System.Windows.Controls.Ribbon.dll

4.7.4050.0

740,288

08-May-2023

21:09

System.Xaml.dll

4.7.4050.0

637,240

08-May-2023

21:09

UIAutomationClient.dll

4.7.4050.0

171,912

08-May-2023

21:09

UIAutomationClientsideProviders.dll

4.7.4050.0

355,264

08-May-2023

21:09

UIAutomationProvider.dll

4.7.4050.0

42,944

08-May-2023

21:09

UIAutomationTypes.dll

4.7.4050.0

214,920

08-May-2023

21:09

WindowsBase.dll

4.7.4050.0

1,290,120

08-May-2023

21:09

WPFFontCache_v0400.exe.mui

4.7.4050.0

13,192

08-May-2023

21:14

WPFFontCache_v0400.exe

4.7.4050.0

19,888

08-May-2023

21:14

wpfgfx_v0400.dll

4.7.4050.0

1,340,808

08-May-2023

21:09

Placeholder.dll

4.7.4050.0

18,824

08-May-2023

21:09

PenIMC2_v0400.dll

4.7.4050.0

80,280

08-May-2023

21:09

x64

File name

File version

File size

Date

Time

clr.dll

4.7.4050.0

10,691,008

08-May-2023

21:38

clr.dll

4.7.4050.0

7,773,576

08-May-2023

21:09

clrjit.dll

4.7.4050.0

1,215,424

08-May-2023

21:38

clrjit.dll

4.7.4050.0

517,016

08-May-2023

21:09

compatjit.dll

4.7.4050.0

1,253,824

08-May-2023

21:38

diasymreader.dll

14.7.4050.0

1,452,992

08-May-2023

21:38

diasymreader.dll

14.7.4050.0

1,067,928

08-May-2023

21:09

GlobalUserInterface.CompositeFont

186,009

08-May-2023

21:09

mscordacwks.dll

4.7.4050.0

1,834,408

08-May-2023

21:38

mscordacwks.dll

4.7.4050.0

1,336,752

08-May-2023

21:09

mscordbi.dll

4.7.4050.0

1,615,792

08-May-2023

21:38

mscordbi.dll

4.7.4050.0

1,162,616

08-May-2023

21:09

mscorlib.dll

4.7.4050.0

5,488,056

08-May-2023

21:38

mscorlib.dll

4.7.4050.0

5,704,600

08-May-2023

21:09

msvcp120_clr0400.dll

12.0.52519.0

690,008

08-May-2023

21:38

msvcp120_clr0400.dll

12.0.52519.0

485,576

08-May-2023

21:09

msvcr120_clr0400.dll

12.0.52519.0

993,632

08-May-2023

21:38

msvcr120_clr0400.dll

12.0.52519.0

987,840

08-May-2023

21:09

VsVersion.dll

14.7.4050.0

13,248

08-May-2023

21:38

VsVersion.dll

14.7.4050.0

13,208

08-May-2023

21:09

peverify.dll

4.7.4050.0

254,872

08-May-2023

21:38

peverify.dll

4.7.4050.0

182,704

08-May-2023

21:09

PresentationCore.dll

4.7.4050.0

3,615,680

08-May-2023

21:38

PresentationCore.dll

4.7.4050.0

3,638,160

08-May-2023

21:09

PresentationFramework.dll

4.7.4050.0

6,269,888

08-May-2023

21:09

PresentationFramework-SystemData.dll

4.7.4050.0

18,328

08-May-2023

21:09

PresentationHost_v0400.dll

4.7.4050.0

271,808

08-May-2023

21:38

PresentationHost_v0400.dll.mui

4.7.4050.0

78,768

08-May-2023

21:38

PresentationHost_v0400.dll

4.7.4050.0

208,280

08-May-2023

21:09

PresentationHost_v0400.dll.mui

4.7.4050.0

78,744

08-May-2023

21:09

PresentationNative_v0400.dll

4.7.4050.0

1,103,808

08-May-2023

21:38

PresentationNative_v0400.dll

4.7.4050.0

821,144

08-May-2023

21:09

SOS.dll

4.7.4050.0

865,696

08-May-2023

21:38

SOS.dll

4.7.4050.0

737,192

08-May-2023

21:09

System.Core.dll

4.7.4050.0

1,547,120

08-May-2023

21:09

System.Data.dll

4.7.4050.0

3,530,168

08-May-2023

21:38

System.Data.dll

4.7.4050.0

3,468,184

08-May-2023

21:09

System.dll

4.7.4050.0

3,559,736

08-May-2023

21:09

System.Windows.Controls.Ribbon.dll

4.7.4050.0

740,288

08-May-2023

21:09

System.Xaml.dll

4.7.4050.0

637,240

08-May-2023

21:09

UIAutomationClient.dll

4.7.4050.0

171,912

08-May-2023

21:09

UIAutomationClientsideProviders.dll

4.7.4050.0

355,264

08-May-2023

21:09

UIAutomationProvider.dll

4.7.4050.0

42,944

08-May-2023

21:09

UIAutomationTypes.dll

4.7.4050.0

214,920

08-May-2023

21:09

WindowsBase.dll

4.7.4050.0

1,290,120

08-May-2023

21:09

WPFFontCache_v0400.exe.mui

4.7.4050.0

13,248

08-May-2023

21:38

WPFFontCache_v0400.exe.mui

4.7.4050.0

13,192

08-May-2023

21:14

WPFFontCache_v0400.exe

4.7.4050.0

20,960

08-May-2023

21:38

WPFFontCache_v0400.exe

4.7.4050.0

19,888

08-May-2023

21:14

wpfgfx_v0400.dll

4.7.4050.0

1,760,704

08-May-2023

21:38

wpfgfx_v0400.dll

4.7.4050.0

1,340,808

08-May-2023

21:09

Placeholder.dll

4.7.4050.0

19,888

08-May-2023

21:38

Placeholder.dll

4.7.4050.0

18,824

08-May-2023

21:09

PenIMC2_v0400.dll

4.7.4050.0

98,752

08-May-2023

21:38

PenIMC2_v0400.dll

4.7.4050.0

80,280

08-May-2023

21:09

How to obtain help and support for this update

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.