Lucene search

K
mskbMicrosoftKB5029924
HistorySep 12, 2023 - 7:00 a.m.

September 12, 2023-KB5029924 Cumulative Update for .NET Framework 4.8 for Windows 10, version 1607 and Windows Server 2016

2023-09-1207:00:00
Microsoft
support.microsoft.com
16
windows 10
windows server 2016
.net framework 4.8
security
reliability
remote code execution
vulnerability

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.2%

September 12, 2023-KB5029924 Cumulative Update for .NET Framework 4.8 for Windows 10, version 1607 and Windows Server 2016

Release Date:
September 12, 2023 Version: ** .NET Framework 4.8**

The September 12, 2023 update for Windows 10, version 1607 and Windows Server 2016 includes security and cumulative reliability improvements in .NET Framework 4.8. We recommend that you apply this update as part of your regular maintenance routines. Before you install this update, see the Prerequisites and Restart requirement sections.

Summary

Security Improvements CVE-2023-36796 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE 2023-36796. CVE-2023-36792 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36792. CVE-2023-36793 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36793. CVE-2023-36794 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36794. CVE-2023-36788 - .NET Framework Remote Code Execution Vulnerability

This security update addresses a vulnerability in the WPF XAML parser where an unsandboxed parser can lead to remote code execution. For more information see CVE 2023-36788.Quality and Reliability Improvements WPF - Addresses an issue where the layout of collapsed panels are affected by CollectionChanged event.
ASP.NET - Addresses an issue in the AspNetEnforceViewStateMac regkey logic.
1Windows Presentation Foundation (WPF)

Known issues in this update

Microsoft is not currently aware of any issues in this update.

How to get this update

Install this update****Release Channel Available Next Step
Windows Update and Microsoft Update Yes None. This update will be downloaded and installed automatically from Windows Update.
Windows Update for Business Yes None. This update will be downloaded and installed automatically from Windows Update.
Microsoft Update Catalog Yes To get the standalone package for this update, go to the Microsoft Update Catalog website.
Windows Server Update Services (WSUS) Yes This update will automatically sync with WSUS if you configure as follows: Product: Windows 10, version 1607 and Windows Server 2016Classification: Security Updates File information For a list of the files that are provided in this update, download the file information for cumulative update.

Prerequisites

To apply this update, you must have .NET Framework 4.8 installed.

Restart requirement

You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

How to obtain help and support for this update

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.2%