Applies to:
Microsoft .NET Framework 4.5.2
Summary
A remote code execution vulnerability exists in .NET Framework when the software fails to check the source markup of XML file input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content. To exploit this vulnerability, an attacker could upload a specially crafted document to a server utilizing an affected product to process content. The security update addresses the vulnerability by correcting how .NET Framework validates the source markup of XML content.
This security update affects how .NET Framework's System.Data.DataTable and System.Data.DataSet types read XML-serialized data. Most .NET Framework applications will not experience any behavioral change after the update is installed. For more information on how the update affects .NET Framework, including examples of scenarios which may be affected, please see the DataTable and DataSet security guidance document at https://go.microsoft.com/fwlink/?linkid=2132227.
To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).
Known Issues
Symptoms:
After you apply this update, some applications experience a TypeInitializationException exception when they try to deserialize System.Data.DataSet or System.Data.DataTable instances from the XML within a SQL CLR stored procedure. The stack trace for this exception appears as follows:
System.TypeInitializationException: The type initializer for 'Scope' threw an exception. ---> System.IO.FileNotFoundException: Could not load file or assembly 'System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a' or one of its dependencies. The system cannot find the file specified.
at System.Data.TypeLimiter.Scope.IsTypeUnconditionallyAllowed(Type type) at System.Data.TypeLimiter.Scope.IsAllowedType(Type type) at System.Data.TypeLimiter.EnsureTypeIsAllowed(Type type, TypeLimiter capturedLimiter)Resolution:
Install the latest version of this update that was released on October 13th, 2020.
Additional information about this update
The following articles contain additional information about this update as it relates to individual product versions.
-
4566467 Description of the Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Server 2012 (KB4566467)
How to obtain and install the update
Before installing this update
Prerequisite:
To apply this update, you must have .NET Framework 4.5.2 installed.
Install this update
Release Channel |
Available |
Next Step |
Microsoft Update Catalog |
Yes |
To get the standalone package for this update, go to the Microsoft Update Catalog website. |
Windows Server Update Services (WSUS) |
Yes |
This update will automatically sync with WSUS if you configure Products and Classifications as follows: Product:Windows Server 2012 Classification: Security Updates |
Prerequisites
To apply this update, you must have .NET Framework 4.5.2 installed.
Restart requirement
You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.
Update deployment information
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
20200714 Security update deployment information: July 14, 2020
Update removal information
Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.
Update restart information
This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.
File information The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. Windows Server 2012 file information
Note: The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
File information
File hash information
File name |
SHA1 hash |
SHA256 hash |
---|---|---|
Windows8-RT-KB4565582-x64.msu |
7A20341182E4BE5ACA1993E7CEDC97A27AF8C531 |
6B120AB26968BB42490D45688032D6DB92463D03A9736645F83C0EE13043F324 |
For all supported x64-based versions
File name |
File version |
File size |
Date |
Time |
Platform |
Msvcp120_clr0400.dll |
12.0.52645.36645 |
679,200 |
09-Jun-2020 |
00:17 |
x64 |
Msvcr120_clr0400.dll |
12.0.52645.36645 |
870,184 |
09-Jun-2020 |
00:17 |
x64 |
System.configuration.dll |
4.0.30319.36645 |
405,136 |
09-Jun-2020 |
00:17 |
x86 |
System.data.dll |
4.0.30319.36645 |
3,246,880 |
09-Jun-2020 |
00:17 |
x64 |
System.configuration.dll |
4.0.30319.36645 |
405,136 |
09-Jun-2020 |
00:16 |
x86 |
Msvcp120_clr0400.dll |
12.0.52645.36645 |
537,376 |
09-Jun-2020 |
00:16 |
x86 |
Msvcr120_clr0400.dll |
12.0.52645.36645 |
876,320 |
09-Jun-2020 |
00:16 |
x86 |
System.data.dll |
4.0.30319.36645 |
3,217,688 |
09-Jun-2020 |
00:16 |
x86 |
Information about protection and security
-
Protect yourself online: Windows Security support
-
Learn how we guard against cyber threats: Microsoft Security