Sign in with Microsoft
Sign in or create an account.
Hello,
Select a different account.
You have multiple accounts
Choose the account you want to sign in with.

Applies to:

Microsoft .NET Framework 3.5

Summary

A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).

Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.

  • 4534977 Description of the Security Only Update for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Server 2012 (KB4534977)

How to obtain and install the update

Method 1: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Method 2: Windows Software Update Services (WSUS)

On your WSUS server, follow these steps:

  1. Select Start, select Administrative Tools, and then select Microsoft Windows Server Update Services 3.0.

  2. Expand ComputerName, and then select Action.

  3. Select Import Updates.

  4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.

  5. After the ActiveX control is installed, you see the Microsoft Update Catalog screen. Type 4534977 into the Search box, and then select Search.

  6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Select Add to add them to your basket.

  7. After you select all the packages that you require, select View Basket.

  8. To import the packages to your WSUS server, select Import.

  9. After the packages are imported, select Close to return to WSUS.

The updates are now available for installation through WSUS.

Update deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

20200114 Security update deployment information: January 14, 2020

Update removal information

Note We do not recommend that you remove any security update. To remove this update, use the Programs and Features item in Control Panel.

Update restart information

This update does not require a system restart after you apply it unless files that are being updated are locked or are being used.


File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2012 file information

Note: The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

File information

File hash information

File name

SHA1 hash

SHA256 hash

Windows8-RT-KB4532958-x64.msu

AACC0C4F61F6E59DF89724A5F56294ED2298F36C

CC342E1A963209A8C95E9D41245B6F8D7629212D4F14F44D284897E6274461DF

For all supported x64-based versions

File name

File version

File size

Date

Time

Platform

Presentationcore.dll

3.0.6920.8833

4,006,400

07-Dec-2019

02:06

x64

Presentationfontcache.exe.config

Not applicable

161

04-May-2018

19:43

Not applicable

Wpfgfx_v0300.dll

3.0.6920.8833

2,265,888

07-Dec-2019

02:06

x64

System.printing.dll

3.0.6920.8833

358,400

07-Dec-2019

02:06

x64

Penimc.dll

3.0.6920.8833

95,728

07-Dec-2019

02:06

x64

Presentationframework.dll

3.0.6920.8833

4,648,960

07-Dec-2019

02:06

x86

Presentationhostdll.dll

3.0.6920.8833

182,048

07-Dec-2019

02:06

x64

Reachframework.dll

3.0.6920.8833

536,576

07-Dec-2019

02:06

x86

Windowsbase.dll

3.0.6920.8833

1,118,208

07-Dec-2019

02:06

x86

System.workflow.activities.dll

3.0.4203.8833

1,060,864

07-Dec-2019

02:06

x86

System.workflow.componentmodel.dll

3.0.4203.8833

1,531,904

07-Dec-2019

02:06

x86

System.workflow.runtime.dll

3.0.4203.8833

454,656

07-Dec-2019

02:06

x86

Presentationframework.dll

3.0.6920.8833

5,292,032

07-Dec-2019

02:06

x86

Reachframework.dll

3.0.6920.8833

536,576

07-Dec-2019

02:06

x86

System.workflow.activities.dll

3.0.4203.8833

1,142,784

07-Dec-2019

02:06

x86

System.workflow.componentmodel.dll

3.0.4203.8833

1,638,400

07-Dec-2019

02:06

x86

System.workflow.runtime.dll

3.0.4203.8833

540,672

07-Dec-2019

02:06

x86

Windowsbase.dll

3.0.6920.8833

1,257,472

07-Dec-2019

02:06

x86

Presentationcore.dll

3.0.6920.8833

4,222,976

07-Dec-2019

02:06

x86

Presentationfontcache.exe.config

Not applicable

161

15-Nov-2017

00:51

Not applicable

Wpfgfx_v0300.dll

3.0.6920.8833

1,747,952

07-Dec-2019

02:06

x86

System.printing.dll

3.0.6920.8833

372,736

07-Dec-2019

02:06

x86

Penimc.dll

3.0.6920.8833

78,624

07-Dec-2019

02:06

x86

Presentationframework.dll

3.0.6920.8833

5,292,032

07-Dec-2019

02:06

x86

Presentationhostdll.dll

3.0.6920.8833

141,288

07-Dec-2019

02:06

x86

Reachframework.dll

3.0.6920.8833

536,576

07-Dec-2019

02:06

x86

Windowsbase.dll

3.0.6920.8833

1,257,472

07-Dec-2019

02:06

x86

System.workflow.activities.dll

3.0.4203.8833

1,142,784

07-Dec-2019

02:06

x86

System.workflow.componentmodel.dll

3.0.4203.8833

1,638,400

07-Dec-2019

02:06

x86

System.workflow.runtime.dll

3.0.4203.8833

540,672

07-Dec-2019

02:06

x86

Information about protection and security

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

Was this information helpful?

What affected your experience?
By pressing submit, your feedback will be used to improve Microsoft products and services. Your IT admin will be able to collect this data. Privacy Statement.

Thank you for your feedback!

×