Lucene search

K
mskbMicrosoftKB5041027
HistoryJul 09, 2024 - 7:00 a.m.

July 9, 2024-Security Only Update for .NET Framework 2.0, 3.0, 3.5 SP1, 4.6.2 for Windows Server 2008 SP2 (KB5041027)

2024-07-0907:00:00
Microsoft
support.microsoft.com
7
security only update
.net framework
windows server 2008 sp2
cve-2024-38081
elevation of privilege
extended security update
esu

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

21.7%

July 9, 2024-Security Only Update for .NET Framework 2.0, 3.0, 3.5 SP1, 4.6.2 for Windows Server 2008 SP2 (KB5041027)

_ Revised July 30, 2024: _ Add breaking change information to known issue section.

Applies to: Microsoft .NET Framework 2.0 Microsoft .NET Framework 3.0 Microsoft .NET Framework 3.5 SP1 Microsoft .NET Framework 4.6.2

REMINDER Windows Server 2008 R2 SP1 have reached the end of mainstream support and are now in extended security update (ESU) support. Starting in July 2020, there will no longer be optional, non-security releases (known as β€œC” releases) for this operating system. Operating systems in extended support have only cumulative monthly security updates (known as the β€œB” or Update Tuesday release). Verify that you have installed the required updates listed in theHow to get this update section before installing this update. Customers who have purchased the Extended Security Update (ESU) for on-premises versions of these operating systems must follow the procedures in KB4522133 to continue receiving security updates after extended support ends on January 14, 2020. For more information on ESU and which editions are supported, see KB4497181. For more information, see the ESU blog.

REMINDER All updates for .NET Framework 4.7.2, 4.7.1, 4.7, 4.6.2, 4.6.1, and 4.6 require that the d3dcompiler_47.dll update is installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll, see KB 4019990. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Summary

CVE-2024-38081 - .NET Framework Elevation of Privilege Vulnerability
This security update addresses a remote code execution vulnerability detailed in CVE-2024-38081.

Known issues in this update

Breaking change details The .NET Framework servicing update released on July 2024 security and quality rollup - .NET Framework contains a security fix addressed an elevation of privilege vulnerability detailed in CVE 2024-38081. The fix changed System.IO.Path.GetTempPath method return value. If windows version exposes the GetTempPath2 Win32 API, this method invokes that API and returns the resolved path. See the Remarks section of the GetTempPath2 documentation for more information on how this resolution is performed, including how to control the return value through the use of environment variables. The GetTempPath2 API may not be available on all versions of Windows. Please reference to the System.IO.Path.GetTempPath API for more information.
Temporary workaround ⚠️**Warning: **The opt-out will disable the security fix for the elevation of privilege vulnerability detailed in CVE 2024-38081. The opt-out is only for temporary workaround if you’re sure that the software is running in secure environments. Microsoft does not recommend applying this temporary workaround.
  • Option#1: Opt out in a command window by setting the environment variable​​​​​​​
    • COMPlus_Disable_GetTempPath2=true
  • Opiton#2: Opt out globally on the machine by creating a system-wide environment variable and rebooting to ensure all processes observe the change. ​​​​​​​​​​​​​​
    • System-wide environment variables can be set by running β€œsysdm.cpl” from a cmd window, and then navigating to β€œAdvanced -> Environment variables -> System variables -> New”.
      Resolution| The API behavior change is by design to address the elevation of privilege vulnerability. Any affected software or application is expected to make code change to adapt to this new design change.

Additional information about this update

The following articles contain additional information about this update as it relates to individual product versions.

  • 5040118 Description of the Security Only Update for .NET Framework 2.0, 3.0 for Windows Server 2008 SP2 (KB5040118)
  • 5040680 Description of the Security Only Update for .NET Framework 3.5 SP1 for Windows Server 2008 SP2 (KB5040680)
  • 5040122 Description of the Security Only Update for .NET Framework 4.6.2 for Windows Server 2008 R2 SP1 and Windows Server 2008 SP2 (KB5040122)

How to get this update

Release Channel Available Next Step
Windows Update and Microsoft Update No See the other options below.
Microsoft Update Catalog Yes To get the standalone package for this update, go to the Microsoft Update Catalog website.
Windows Server Update Services (WSUS) Yes This operating system update will offer, as applicable, and individual .NET Framework product updates will be installed. For more information about individual .NET Framework product updates see additional information about this update section. This update will automatically sync with WSUS if you configure as follows: Product: Windows Server 2008 Service Pack 2Classification: Security Updates

How to obtain help and support for this update

CVSS3

7.3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0.001

Percentile

21.7%