Applies To.NET

Applies to:

Microsoft .NET Framework 3.5.1

REMINDER Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 have reached the end of mainstream support and are now in extended security update (ESU) support.

Starting in July 2020, there will no longer be optional, non-security releases (known as "C" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the "B" or Update Tuesday release).

Verify that you have installed the required updates listed in the How to get this update section before installing this update. 

Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in KB4522133 to continue receiving security updates after extended support ends on January 14, 2020. For more information on ESU and which editions are supported, see KB4497181. For more information, see the ESU blog.

The September 12, 2023 update for Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 includes security improvements in .NET Framework 3.5.1. We recommend that you apply this update as part of your regular maintenance routines. Verify that you have installed the required updates listed in the How to get this update section before installing this update.

Summary

CVE-2023-36796 - .NET Framework Remote Code Execution Vulnerability This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE 2023-36796.

CVE-2023-36792 - .NET Framework Remote Code Execution Vulnerability This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36792.

CVE-2023-36793 - .NET Framework Remote Code Execution Vulnerability This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36793.

CVE-2023-36794 - .NET Framework Remote Code Execution Vulnerability This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36794.

CVE-2023-36788 - .NET Framework Remote Code Execution Vulnerability This security update addresses a vulnerability in the WPF XAML parser where an unsandboxed parser can lead to remote code execution. For more information see CVE 2023-36788.

Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.

  • 5030173 Description of the Security Only Update for .NET Framework 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Embedded 7 Standard and Windows Server 2008 R2 SP1 (KB5030173)

Known issues in this update

Microsoft is not currently aware of any issues in this update.

How to get this update

Before installing this update

Prerequisite:

To apply this update, you must have .NET Framework 3.5.1 installed.

You must install the updates listed below and restart your device before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.

  1. The March 12, 2019 servicing stack update (SSU) (KB4490628). To get the standalone package for this SSU, search for it in the Microsoft Update Catalog. This update is required to install updates that are only SHA-2 signed.

  2. The latest SHA-2 update (KB4474419) released September 10, 2019 or newer update. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.

  3. To get this security update, you must reinstall the "Extended Security Updates (ESU) Licensing Preparation Package" (KB5016892) for Windows Server 2008 R2 SP1 that is dated August 8, 2022 even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the Microsoft Update Catalog.

  4. After you install the items above, we strongly recommend that you install the latest SSU.

    ​​​​​​​For Windows Server 2008 R2 SP1, you must have the servicing stack update (SSU) (KB5017397) that is dated September 13, 2022 or later installed. For more information about the latest SSU updates, see ADV990001 | Latest Servicing Stack Updates. If you use Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog. For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.

  5. Download the ESU MAK add-on key from the VLSC portal and deploy and activate the ESU MAK add-on key. If you use the Volume Activation Management Tool  (VAMT) to deploy and activate keys, follow the instructions here.

    IMPORTANT You do not need an additional key for deployment of the following:

    • You do not need to deploy an additional ESU key for Azure virtual machines (VMs), Azure Stack HCI.

    • For other Azure products such as Azure VMWare, Azure Nutanix solution Azure Stack (Hub, Edge), or for bring-your-own images on Azure for Windows Server 2008 SP2, and Windows Server 2008 R2 SP1 you do need to deploy the ESU key.  The steps to install, activate, and deploy ESUs are the same for the fourth year of ESU coverage.

Install this update

Release Channel

Available

Next Step

Windows Update and Microsoft Update

No

See the other options below.

Microsoft Update Catalog

Yes

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Windows Server Update Services (WSUS)

Yes

This individual .NET Framework product update will be installed, as applicable, by applying the operating system update. For more information about operating system updates see additional information about this update section.

Restart requirement

You may need to restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

Update deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

20230912 Security update deployment information: September 12, 2023

File Information

File hash information

File name

SHA256 hash

windows6.1-kb5029948-x86.msu

ACA939721C31BFDBDE0FA4A1F8E4B3ABAD38C2B0A998C0DD1A5B25BB816EE81B

windows6.1-kb5029948-x64.msu

297D562EE996A0F4A22858A07582DCF4F168F915811C24B8982D8C0769208CB5

File name

File version

File size

Date

Time

Platform

Presentationframework.dll

3.0.6920.8957

5,296,128

04-Aug-2023

00:15

x86

Reachframework.dll

3.0.6920.8957

536,576

04-Aug-2023

00:15

x86

Windowsbase.dll

3.0.6920.8957

1,257,472

04-Aug-2023

00:15

x86

Presentationcore.dll

3.0.6920.8957

4,222,976

04-Aug-2023

00:15

x86

Presentationfontcache.exe.config

Not applicable

161

21-Jul-2023

00:20

Not applicable

Wpfgfx_v0300.dll

3.0.6920.8957

1,741,192

04-Aug-2023

00:15

x86

System.printing.dll

3.0.6920.8957

372,736

04-Aug-2023

00:15

x86

Penimc.dll

3.0.6920.8957

72,112

04-Aug-2023

00:15

x86

Presentationframework.dll

3.0.6920.8957

5,296,128

04-Aug-2023

00:15

x86

Presentationhostdll.dll

3.0.6920.8957

134,536

04-Aug-2023

00:15

x86

Reachframework.dll

3.0.6920.8957

536,576

04-Aug-2023

00:15

x86

Windowsbase.dll

3.0.6920.8957

1,257,472

04-Aug-2023

00:15

x86

File name

File version

File size

Date

Time

Platform

Presentationcore.dll

3.0.6920.8957

4,006,400

04-Aug-2023

00:16

x64

Presentationfontcache.exe.config

Not applicable

161

21-Jul-2023

00:19

Not applicable

Wpfgfx_v0300.dll

3.0.6920.8957

2,259,336

04-Aug-2023

00:16

x64

System.printing.dll

3.0.6920.8957

358,400

04-Aug-2023

00:16

x64

Penimc.dll

3.0.6920.8957

88,984

04-Aug-2023

00:16

x64

Presentationframework.dll

3.0.6920.8957

4,653,056

04-Aug-2023

00:16

x86

Presentationhostdll.dll

3.0.6920.8957

175,496

04-Aug-2023

00:16

x64

Reachframework.dll

3.0.6920.8957

536,576

04-Aug-2023

00:16

x86

Windowsbase.dll

3.0.6920.8957

1,118,208

04-Aug-2023

00:16

x86

Presentationframework.dll

3.0.6920.8957

5,296,128

04-Aug-2023

00:15

x86

Reachframework.dll

3.0.6920.8957

536,576

04-Aug-2023

00:15

x86

Windowsbase.dll

3.0.6920.8957

1,257,472

04-Aug-2023

00:15

x86

Presentationcore.dll

3.0.6920.8957

4,222,976

04-Aug-2023

00:15

x86

Presentationfontcache.exe.config

Not applicable

161

21-Jul-2023

00:20

Not applicable

Wpfgfx_v0300.dll

3.0.6920.8957

1,741,192

04-Aug-2023

00:15

x86

System.printing.dll

3.0.6920.8957

372,736

04-Aug-2023

00:15

x86

Penimc.dll

3.0.6920.8957

72,112

04-Aug-2023

00:15

x86

Presentationframework.dll

3.0.6920.8957

5,296,128

04-Aug-2023

00:15

x86

Presentationhostdll.dll

3.0.6920.8957

134,536

04-Aug-2023

00:15

x86

Reachframework.dll

3.0.6920.8957

536,576

04-Aug-2023

00:15

x86

Windowsbase.dll

3.0.6920.8957

1,257,472

04-Aug-2023

00:15

x86

How to obtain help and support for this update

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.