Applies to:

Microsoft .NET Framework 4.5.2

Summary

A remote code execution vulnerability exists in .NET Framework when the software fails to check the source markup of XML file input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content. To exploit this vulnerability, an attacker could upload a specially crafted document to a server utilizing an affected product to process content. The security update addresses the vulnerability by correcting how .NET Framework validates the source markup of XML content.

This security update affects how .NET Framework's System.Data.DataTable and System.Data.DataSet types read XML-serialized data. Most .NET Framework applications will not experience any behavioral change after the update is installed. For more information on how the update affects .NET Framework, including examples of scenarios which may be affected, please see the DataTable and DataSet security guidance document at https://go.microsoft.com/fwlink/?linkid=2132227.

To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).

Important

  • As a reminder to advanced IT administrators, updates to .NET Framework 3.5 for Windows 8.1 and Windows Server 2012 R2 should only be applied on systems where .NET Framework 3.5 is present and enabled. Customers who attempt to pre-install updates to .NET Framework 3.5 to offline images that do not contain the .NET Framework 3.5 product enabled will expose these systems to failures to enable .NET Framework 3.5 after the systems are online. For more extensive information about deploying .NET Framework 3.5, see Microsoft .NET Framework 3.5 Deployment Considerations.

  • All updates for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 require that update KB 2919355 is installed. We recommend that you install update KB 2919355 on your Windows 8.1-based, Windows RT 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future.

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Known Issues

Symptoms:

After you apply this update, some applications experience a TypeInitializationException exception when they try to deserialize System.Data.DataSet or System.Data.DataTable instances from the XML within a SQL CLR stored procedure. The stack trace for this exception appears as follows:

System.TypeInitializationException: The type initializer for 'Scope' threw an exception. ---> System.IO.FileNotFoundException: Could not load file or assembly 'System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a' or one of its dependencies. The system cannot find the file specified.
     at System.Data.TypeLimiter.Scope.IsTypeUnconditionallyAllowed(Type type)
     at System.Data.TypeLimiter.Scope.IsAllowedType(Type type)
     at System.Data.TypeLimiter.EnsureTypeIsAllowed(Type type, TypeLimiter capturedLimiter)

Resolution:

Install the latest version of this update that was released on October 13th, 2020.

Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.

  • 4566468 Description of the Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows 8.1 and Windows Server 2012 R2 (KB4566468)

How to obtain and install the update

Before installing this update

Prerequisite:

To apply this update, you must have .NET Framework 4.5.2 installed.

Install this update

Release Channel

Available

Next Step

Microsoft Update Catalog

Yes

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Windows Server Update Services (WSUS)

Yes

This update will automatically sync with WSUS if you configure Products and Classifications as follows:

Product:Windows 8.1 and Windows Server 2012 R2

Classification: Security Updates

Prerequisites

To apply this update, you must have .NET Framework 4.5.2 installed.

Restart requirement

You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

Update deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

20200714 Security update deployment information: July 14, 2020

Update removal information

Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.

Update restart information

This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.


File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2 file information

Note: The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

File information

File hash information

File name

SHA1 hash

SHA256 hash

Windows8.1-KB4565581-x64.msu

F298B6AD52FCDA8DD182530AE13488371FA330C4

9281BCCBA098C090EBD9F07E6AE4CB0B590E1254FC4336E52E066C88D56CDA9F

Windows8.1-KB4565581-x86.msu

143B911BA65129DAD7F29E83958C93EA899BB92F

775AD7F9072D0AAC421DF18310FCA550ED1F01985B9DC306ADF060A89AADB408

Windows8.1-KB4565581-arm.msu

F2D1647ACB58B0E1F771B848BF877E0F5CF5BC3C

DB04F3C271F993483A69C23F15E85972545956694D8F22D884508FE3A8368EBE

For all supported x64-based versions

File name

File version

File size

Date

Time

Platform

Msvcp120_clr0400.dll

12.0.52645.36645

679,200

06-Jun-2020

13:35

x64

Msvcr120_clr0400.dll

12.0.52645.36645

870,184

06-Jun-2020

13:35

x64

System.configuration.dll

4.0.30319.36645

405,136

06-Jun-2020

13:35

x86

System.data.dll

4.0.30319.36645

3,246,880

06-Jun-2020

13:35

x64

System.configuration.dll

4.0.30319.36645

405,136

06-Jun-2020

13:35

x86

Msvcp120_clr0400.dll

12.0.52645.36645

537,376

06-Jun-2020

13:35

x86

Msvcr120_clr0400.dll

12.0.52645.36645

876,320

06-Jun-2020

13:35

x86

System.data.dll

4.0.30319.36645

3,217,688

06-Jun-2020

13:35

x86

For all supported x86-based versions

File name

File version

File size

Date

Time

Platform

System.configuration.dll

4.0.30319.36645

405,136

06-Jun-2020

13:35

x86

Msvcp120_clr0400.dll

12.0.52645.36645

537,376

06-Jun-2020

13:35

x86

Msvcr120_clr0400.dll

12.0.52645.36645

876,320

06-Jun-2020

13:35

x86

System.data.dll

4.0.30319.36645

3,217,688

06-Jun-2020

13:35

x86

For all supported ARM-based versions

File name

File version

File size

Date

Time

Platform

Msvcp120_clr0400.dll

12.0.52645.36645

601,880

06-Jun-2020

13:33

Not applicable

Msvcr120_clr0400.dll

12.0.52645.36645

634,128

06-Jun-2020

13:33

Not applicable

System.data.dll

4.0.30319.36645

3,187,984

06-Jun-2020

13:33

Not applicable

System.configuration.dll

4.0.30319.36645

405,136

06-Jun-2020

13:33

x86

Information about protection and security

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×