Applies To.NET

Revised July 30, 2024: Add breaking change information to known issue section. 

Applies to:

Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.7.1 Microsoft .NET Framework 4.7.2

REMINDER Windows Server 2008 R2 SP1 have reached the end of mainstream support and are now in extended security update (ESU) support.

Starting in July 2020, there will no longer be optional, non-security releases (known as "C" releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the "B" or Update Tuesday release).

Verify that you have installed the required updates listed in the How to get this update section before installing this update. 

Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in KB4522133 to continue receiving security updates after extended support ends on January 14, 2020. For more information on ESU and which editions are supported, see KB4497181. For more information, see the ESU blog.

REMINDER All updates for .NET Framework 4.7.2, 4.7.1, 4.7, 4.6.2, 4.6.1, and 4.6 require that the d3dcompiler_47.dll update is installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll, see KB 4019990.

If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

The July 9, 2024 update for Windows Server 2008 R2 SP1 and Windows Server 2008 SP2 includes security improvements in .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2. We recommend that you apply this update as part of your regular maintenance routines. Verify that you have installed the required updates listed in the How to get this update section before installing this update.

Summary

CVE-2024-38081 - .NET Framework Elevation of Privilege Vulnerability This security update addresses a remote code execution vulnerability detailed in CVE-2024-38081.

Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.

  • 5041027 Description of the Security Only Update for .NET Framework 2.0, 3.0, 3.5 SP1, 4.6.2 for Windows Server 2008 SP2 (KB5041027)

  • 5041026 Description of the Security Only Update for .NET Framework 3.5.1, 4.6.2, 4.7, 4.7.1, 4.7.2, 4.8 for Windows Server 2008 R2 SP1 (KB5041026)

Known issues in this update

Breaking change details

The .NET Framework servicing update released on July 2024 security and quality rollup - .NET Framework contains a security fix addressed an elevation of privilege vulnerability detailed in CVE 2024-38081. The fix changed System.IO.Path.GetTempPath method return value. If windows version exposes the GetTempPath2 Win32 API, this method invokes that API and returns the resolved path. See the Remarks section of the GetTempPath2 documentation for more information on how this resolution is performed, including how to control the return value through the use of environment variables. The GetTempPath2 API may not be available on all versions of Windows.

Please reference to the System.IO.Path.GetTempPath API for more information.

Temporary workaround

⚠️ Warning: The opt-out will disable the security fix for the elevation of privilege vulnerability detailed in CVE 2024-38081. The opt-out is only for temporary workaround if you're sure that the software is running in secure environments. Microsoft does not recommend applying this temporary workaround.

Resolution

The API behavior change is by design to address the elevation of privilege vulnerability. Any affected software or application is expected to make code change to adapt to this new design change.

How to get this update

Before installing this update

Prerequisite:

To apply this update, you must have .NET Framework 4.6.2, 4.7, 4.7.1, 4.7.2 installed.

You must install the updates listed below and restart your device before installing the latest Rollup. Installing these updates improves the reliability of the update process and mitigates potential issues while installing the Rollup and applying Microsoft security fixes.

Operating System

Prerequisites for installing this update

Windows Server 2008 SP2

  1. The April 9, 2019 servicing stack update (SSU) (KB4493730). To get the standalone package for this SSU, search for it in the Microsoft Update Catalog. This update is required to install updates that are only SHA-2 signed.

  2. The latest SHA-2 update (KB4474419) released October 8, 2019 or newer update. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.

  3. To get this security update, you must reinstall the "Extended Security Updates (ESU) Licensing Preparation Package" (KB5016891) for Windows Server 2008 SP2 that is dated August 8, 2022 even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the Microsoft Update Catalog.

  4. After you install the items above, we strongly recommend that you install the latest SSU. For Windows Server 2008 SP2, you must have the servicing stack update (SSU) (KB5016129) that is dated July 12, 2022 or later installed. For more information about the latest SSU updates, see ADV990001 | Latest Servicing Stack Updates. If you use Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog. For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.

  5. Download the ESU MAK add-on key from the VLSC portal and deploy and activate the ESU MAK add-on key. If you use the Volume Activation Management Tool  (VAMT) to deploy and activate keys, follow the instructions here.

    IMPORTANT You do not need an additional key for deployment of the following:

    • You do not need to deploy an additional ESU key for Azure virtual machines (VMs), Azure Stack HCI, version 21H2 and later.

    • For other Azure products such as Azure VMWare, Azure Nutanix solution Azure Stack (Hub, Edge), or for bring-your-own images on Azure for Windows Server 2008 SP2, you do need to deploy the ESU key.  The steps to install, activate, and deploy ESUs are the same for the fourth year of ESU coverage.

Windows Server 2008 R2

  1. The March 12, 2019 servicing stack update (SSU) (KB4490628). To get the standalone package for this SSU, search for it in the Microsoft Update Catalog. This update is required to install updates that are only SHA-2 signed.

  2. The latest SHA-2 update (KB4474419) released September 10, 2019 or newer update. If you are using Windows Update, the latest SHA-2 update will be offered to you automatically. This update is required to install updates that are only SHA-2 signed. For more information on SHA-2 updates, see 2019 SHA-2 Code Signing Support requirement for Windows and WSUS.

  3. To get this security update, you must reinstall the "Extended Security Updates (ESU) Licensing Preparation Package" (KB5016892) for Windows Server 2008 R2 SP1 that is dated August 8, 2022 even if you previously installed the ESU key. The ESU licensing preparation package will be offered to you from WSUS. To get the standalone package for ESU licensing preparation package, search for it in the Microsoft Update Catalog.

  4. After you install the items above, we strongly recommend that you install the latest SSU.

    ​​​​​​​For Windows Server 2008 R2 SP1, you must have the servicing stack update (SSU) (KB5017397) that is dated September 13, 2022 or later installed. For more information about the latest SSU updates, see ADV990001 | Latest Servicing Stack Updates. If you use Windows Update, the latest SSU will be offered to you automatically if you are an ESU customer. To get the standalone package for the latest SSU, search for it in the Microsoft Update Catalog. For general information about SSUs, see Servicing stack updates and Servicing Stack Updates (SSU): Frequently Asked Questions.

  5. Download the ESU MAK add-on key from the VLSC portal and deploy and activate the ESU MAK add-on key. If you use the Volume Activation Management Tool  (VAMT) to deploy and activate keys, follow the instructions here.

    IMPORTANT You do not need an additional key for deployment of the following:

    • You do not need to deploy an additional ESU key for Azure virtual machines (VMs), Azure Stack HCI.

    • For other Azure products such as Azure VMWare, Azure Nutanix solution Azure Stack (Hub, Edge), or for bring-your-own images on Azure for Windows Server 2008 SP2, and Windows Server 2008 R2 SP1 you do need to deploy the ESU key.  The steps to install, activate, and deploy ESUs are the same for the fourth year of ESU coverage.

Install this update

Release Channel

Available

Next Step

Windows Update and Microsoft Update

No

See the other options below.

Microsoft Update Catalog

Yes

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Windows Server Update Services (WSUS)

Yes

This individual .NET Framework product update will be installed, as applicable, by applying the operating system update. For more information about operating system updates see additional information about this update section.

Restart requirement

You may need to restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

Update deployment information

For deployment details for this security update, see the Deployments tab of the Microsoft Security Response Center (MSRC) Security Update Guide.

File Information

x86

File name

File version

File size

Date

Time

vbc.exe

14.7.4101.0

2,682,336

08-Jun-2024

02:27

aspnet_regbrowsers.exe

4.7.4101.0

39,480

08-Jun-2024

02:27

aspnet_regiis.exe

4.7.4101.0

35,376

08-Jun-2024

02:27

aspnet_regsql.exe

4.7.4101.0

121,392

08-Jun-2024

02:27

clr.dll

4.7.4101.0

7,773,616

08-Jun-2024

02:27

clrjit.dll

4.7.4101.0

517,056

08-Jun-2024

02:27

mscordacwks.dll

4.7.4101.0

1,336,736

08-Jun-2024

02:27

mscordbi.dll

4.7.4101.0

1,162,672

08-Jun-2024

02:27

mscorlib.dll

4.7.4101.0

5,705,248

08-Jun-2024

02:27

mscorpehost.dll

4.7.4101.0

149,032

08-Jun-2024

02:27

msvcp120_clr0400.dll

12.0.52519.0

485,576

08-Jun-2024

02:27

msvcr120_clr0400.dll

12.0.52519.0

987,840

08-Jun-2024

02:27

peverify.dll

4.7.4101.0

182,720

08-Jun-2024

02:27

PresentationHost_v0400.dll

4.7.4101.0

208,816

08-Jun-2024

02:27

PresentationHost_v0400.dll.mui

4.7.4101.0

78,768

08-Jun-2024

02:27

SOS.dll

4.7.4101.0

737,184

08-Jun-2024

02:27

x64

File name

File version

File size

Date

Time

vbc.exe

14.7.4101.0

3,220,976

08-Jun-2024

02:37

vbc.exe

14.7.4101.0

2,682,336

08-Jun-2024

02:27

aspnet_regbrowsers.exe

4.7.4101.0

38,856

08-Jun-2024

02:37

aspnet_regbrowsers.exe

4.7.4101.0

39,480

08-Jun-2024

02:27

aspnet_regiis.exe

4.7.4101.0

38,960

08-Jun-2024

02:37

aspnet_regiis.exe

4.7.4101.0

35,376

08-Jun-2024

02:27

aspnet_regsql.exe

4.7.4101.0

120,880

08-Jun-2024

02:37

aspnet_regsql.exe

4.7.4101.0

121,392

08-Jun-2024

02:27

clr.dll

4.7.4101.0

10,691,008

08-Jun-2024

02:37

clr.dll

4.7.4101.0

7,773,616

08-Jun-2024

02:27

clrjit.dll

4.7.4101.0

1,215,528

08-Jun-2024

02:37

clrjit.dll

4.7.4101.0

517,056

08-Jun-2024

02:27

compatjit.dll

4.7.4101.0

1,253,808

08-Jun-2024

02:37

mscordacwks.dll

4.7.4101.0

1,834,400

08-Jun-2024

02:37

mscordacwks.dll

4.7.4101.0

1,336,736

08-Jun-2024

02:27

mscordbi.dll

4.7.4101.0

1,615,792

08-Jun-2024

02:37

mscordbi.dll

4.7.4101.0

1,162,672

08-Jun-2024

02:27

mscorlib.dll

4.7.4101.0

5,488,672

08-Jun-2024

02:37

mscorlib.dll

4.7.4101.0

5,705,248

08-Jun-2024

02:27

mscorpehost.dll

4.7.4101.0

183,728

08-Jun-2024

02:37

mscorpehost.dll

4.7.4101.0

149,032

08-Jun-2024

02:27

msvcp120_clr0400.dll

12.0.52519.0

690,008

08-Jun-2024

02:37

msvcp120_clr0400.dll

12.0.52519.0

485,576

08-Jun-2024

02:27

msvcr120_clr0400.dll

12.0.52519.0

993,632

08-Jun-2024

02:37

msvcr120_clr0400.dll

12.0.52519.0

987,840

08-Jun-2024

02:27

peverify.dll

4.7.4101.0

254,896

08-Jun-2024

02:37

peverify.dll

4.7.4101.0

182,720

08-Jun-2024

02:27

PresentationHost_v0400.dll

4.7.4101.0

271,792

08-Jun-2024

02:37

PresentationHost_v0400.dll.mui

4.7.4101.0

78,768

08-Jun-2024

02:37

PresentationHost_v0400.dll

4.7.4101.0

208,816

08-Jun-2024

02:27

PresentationHost_v0400.dll.mui

4.7.4101.0

78,768

08-Jun-2024

02:27

SOS.dll

4.7.4101.0

865,696

08-Jun-2024

02:37

SOS.dll

4.7.4101.0

737,184

08-Jun-2024

02:27

How to obtain help and support for this update

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.