Applies to:

Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.7.1 Microsoft .NET Framework 4.7.2

Summary

Security improvements

An elevation of privilege vulnerability exists when ASP.NET or .NET Framework web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. To exploit this vulnerability, an attacker would need to send a specially crafted request to an affected server. The update addresses the vulnerability by changing how ASP.NET and .NET Framework handle requests.

To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).

Important

  • All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require that the d3dcompiler_47.dll update is installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll, see KB 4019990.

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.

  • 4570501 Description of the Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Server 2012 (KB4570501)

How to obtain and install the update

Before installing this update

Prerequisite:

To apply this update, you must have .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 installed.

Install this update

Release Channel

Available

Next Step

Microsoft Update Catalog

Yes

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Windows Server Update Services (WSUS)

Yes

This update will automatically sync with WSUS if you configure Products and Classifications as follows:

Product:Windows Server 2012

Classification: Security Updates

Prerequisites

To apply this update, you must have .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 installed.

Restart requirement

You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

Update deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

20200811 Security update deployment information: August 11, 2020

Update removal information

Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.

Update restart information

This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.


File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2012 file information

Note: The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

File information

File hash information

File name

SHA1 hash

SHA256 hash

Windows8-RT-KB4569738-x64.msu

B117C4072D75AE8BED02532577CFE8763BF34930

E57E2784054117B9653D83158E54915431FFEC8A7D53E86F58B0C6B78F25AD84

For all supported x64-based versions

File name

File version

File size

Date

Time

Platform

SP requirement

Service branch

Aspnet_perf.dll

4.7.3650.0

39,304

30-Jun-2020

01:02

x64

SPN

AMD64_NETFX4-ASP

Aspnet_state_perf.h

Not applicable

318

29-Jun-2020

22:15

Not applicable

SPN

AMD64_NETFX4-ASP

Aspnet_state_perf.ini

Not applicable

42,996

30-Jun-2020

01:02

Not applicable

SPN

AMD64_NETFX4-ASP

Aspnet_wp.exe

4.7.3650.0

43,920

30-Jun-2020

01:02

x64

SPN

AMD64_NETFX4-ASP

Msvcp120_clr0400.dll

12.0.52519.0

690,008

11-Jun-2020

23:36

x64

None

Not applicable

Msvcr120_clr0400.dll

12.0.52519.0

993,632

11-Jun-2020

23:36

x64

None

Not applicable

System.web.applicationservices.dll

4.7.3650.0

63,768

30-Jun-2020

01:11

x86

None

Not applicable

System.web.extensions.dll

4.7.3650.0

1,842,968

30-Jun-2020

01:11

x86

None

Not applicable

Webengine4.dll

4.7.3650.0

660,352

30-Jun-2020

01:02

x64

None

Not applicable

Webengine.dll

4.7.3650.0

19,328

30-Jun-2020

01:02

x64

None

Not applicable

System.web.dll

4.7.3650.0

5,392,256

30-Jun-2020

01:02

x64

None

Not applicable

System.web.applicationservices.dll

4.7.3650.0

63,768

30-Jun-2020

01:11

x86

None

Not applicable

System.web.extensions.dll

4.7.3650.0

1,842,968

30-Jun-2020

01:11

x86

None

Not applicable

Aspnet_perf.dll

4.7.3650.0

35,720

30-Jun-2020

01:11

x86

SPN

X86_NETFX4-ASP

Aspnet_state_perf.h

Not applicable

318

29-Jun-2020

22:28

Not applicable

SPN

X86_NETFX4-ASP

Aspnet_state_perf.ini

Not applicable

42,996

30-Jun-2020

01:12

Not applicable

SPN

X86_NETFX4-ASP

Aspnet_wp.exe

4.7.3650.0

39,304

30-Jun-2020

01:11

x86

SPN

X86_NETFX4-ASP

Msvcp120_clr0400.dll

12.0.52519.0

485,576

11-Jun-2020

23:36

x86

None

Not applicable

Msvcr120_clr0400.dll

12.0.52519.0

987,840

11-Jun-2020

23:36

x86

None

Not applicable

System.web.extensions.dll

4.7.3650.0

1,842,968

30-Jun-2020

01:11

x86

None

Not applicable

Webengine4.dll

4.7.3650.0

543,112

30-Jun-2020

01:11

x86

None

Not applicable

Webengine.dll

4.7.3650.0

17,792

30-Jun-2020

01:11

x86

None

Not applicable

System.web.dll

4.7.3650.0

5,409,160

30-Jun-2020

01:11

x86

None

Not applicable

Information about protection and security

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Any additional feedback? (Optional)

Thank you for your feedback!

×