.NET Framework May 2020 Security and Quality Rollup Updates

Tara Overfield

Tara

Revised 6/8/2021: On June 8th, 2021, this update was released to replace a previous update to address a “revocation server was offline” error that may occur during installation. If you’ve already installed a previous release of this update, no action is required.

Revised 4/15/2021: On April 13th, 2021, this update was released to replace a previous release of this some updates. See known issues section for more details. If you’ve already installed a previous release of an affected update, no action is required.

On July 23, 2020, updates KB4552952 v2, KB4552951 v2, and KB4552953 v2 were released to replace v1 of those updates for .NET Framework 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2, and 4.8 for Windows 7 Service Pack 1 (SP1), Windows Server 2008 R2 SP1 and Windows Server 2008 Service Pack 2 (SP2). The v1 updates did not install for customers who had certain ESU configurations. The v2 updates correct the issue for customers who could not install the v1 updates.

If you have already installed v1 of these updates, no action is necessary.

To obtain v2 of these updates, see the “How to obtain and install the update” section of the individual update article. Links to each article are found in the “Additional information about this update section” of the KB article.

Today, we are releasing the May 2020 Security and Quality Rollup Updates for .NET Framework.

Security

CVE-2020-0605 – .NET Framework Remote Code Execution Vulnerability

A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of .NET Framework. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.

The security update addresses the vulnerability by correcting how .NET Framework checks the source markup of a file.

CVE-2020-1108 – .NET Framework Denial of Service Vulnerability

A denial of service vulnerability exists when .NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET Core web application. The vulnerability can be exploited remotely, without authentication.

A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Core application.

The update addresses the vulnerability by correcting how the .NET Core web application handles web requests

CVE-2020-1066 – .NET Framework Elevation of Privilege Vulnerability

An elevation of privilege vulnerability exists in .NET Framework which could allow an attacker to elevate their privilege level.

To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program.

The update addresses the vulnerability by correcting how .NET Framework activates COM objects.

Quality and Reliability

This release contains new quality and reliability improvements for Server 2008 SP1, Windows 7 SP1, Windows Server 2008 R2 SP1, and Windows 10 1703 (Creators Update) that were previously released for other versions of Windows in the February 2020 Preview of Quality Rollup.

Known issues in this security update

Symptom Customers using Windows 7 SP1, Windows Server 2008 R2 SP1 or Windows Server 2008, this update does not install, and it returns either or both of the following error messages:

  • -2146762495
  • A required certificate is not within its validity period when verifying against the current system clock or the timestamp in the signed file.
  • The revocation function was unable to check revocation because the revocation server was offline.

Workaround

This issue was corrected by the latest release of this update. If you’ve already installed a previous release of this update, no action is required.

Getting the Update

The Security and Quality Rollup is available via Windows Update, Windows Server Update Services, and Microsoft Update Catalog. The Security Only Update is available via Windows Server Update Services and Microsoft Update Catalog.

Microsoft Update Catalog

You can get the update via the Microsoft Update Catalog. For Windows 10, NET Framework 4.8 updates are available via Windows Update, Windows Server Update Services, Microsoft Update Catalog. Updates for other versions of .NET Framework are part of the Windows 10 Monthly Cumulative Update.

**Note**: Customers that rely on Windows Update and Windows Server Update Services will automatically receive the .NET Framework version-specific updates. Advanced system administrators can also take use of the below direct Microsoft Update Catalog download links to .NET Framework-specific updates. Before applying these updates, please ensure that you carefully review the .NET Framework version applicability, to ensure that you only install updates on systems where they apply.

The following table is for Windows 10 and Windows Server 2016+ versions.

Product Version Cumulative Update
Windows 10 2004 and Windows Server, version 2004
.NET Framework 3.5, 4.8 Catalog 4552925
Windows 10 1909 and Windows Server, version 1909
.NET Framework 3.5, 4.8 Catalog 4552931
Windows 10 1903 and Windows Server, version 1903
.NET Framework 3.5, 4.8 Catalog 4552931
Windows 10 1809 (October 2018 Update) and Windows Server 2019 4556441
.NET Framework 3.5, 4.7.2 Catalog 4552924
.NET Framework 3.5, 4.8 Catalog 4552930
Windows 10 1803 (April 2018 Update)
.NET Framework 3.5, 4.7.2 Catalog 4556807
.NET Framework 4.8 Catalog 4552929
Windows 10 1709 (Fall Creators Update)
.NET Framework 3.5, 4.7.1, 4.7.2 Catalog 4556812
.NET Framework 4.8 Catalog 4552928
Windows 10 1703 (Creators Update)
.NET Framework 3.5, 4.7, 4.7.1, 4.7.2 Catalog 4556804
.NET Framework 4.8 Catalog 4552927
Windows 10 1607 (Anniversary Update) and Windows Server 2016
.NET Framework 3.5, 4.6.2, 4.7, 4.7.1, 4.7.2 Catalog 4556813
.NET Framework 4.8 Catalog 4552926
Windows 10 1507
.NET Framework 3.5, 4.6, 4.6.1, 4.6.2 Catalog 4556826

The following table is for earlier Windows and Windows Server versions.

Product Version Security and Quality Rollup Security Only Update
Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2 4556401 4556405
.NET Framework 3.5 Catalog 4552982 Catalog 4552966
.NET Framework 4.5.2 Catalog 4552946 Catalog 4552967
.NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 Catalog 4552923 Catalog 4552959
.NET Framework 4.8 Catalog 4552933 Catalog 4552962
Windows Server 2012 4556400 4556404
.NET Framework 3.5 Catalog 4552979 Catalog 4552963
.NET Framework 4.5.2 Catalog 4552947 Catalog 4552968
.NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 Catalog 4552922 Catalog 4552958
.NET Framework 4.8 Catalog 4552932 Catalog 4552961
Windows 7 SP1 and Windows Server 2008 R2 SP1 4556399 4556403
.NET Framework 3.5.1 Catalog 4552940 Catalog 4552965
.NET Framework 4.5.2 Catalog 4552920 Catalog 4552952
.NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 Catalog 4552919 Catalog 4552951
.NET Framework 4.8 Catalog 4552921 Catalog 4552953
Windows Server 2008 4556402 4556406
.NET Framework 2.0, 3.0 Catalog 4552939 Catalog 4552964
.NET Framework 4.5.2 Catalog 4552920 Catalog 4552952
.NET Framework 4.6 Catalog 4552919 Catalog 4552951

Previous Monthly Rollups

The last few .NET Framework Monthly updates are listed below for your convenience:

* March 2020 Update for Windows 10 1607 (Anniversary Update) and Windows Server 2016 * February 2020 Preview of Quality Rollup for Windows 10 1909, Windows 10 1903, Windows Server, version 1909 and Windows Server, version 1903 * February 2020 Preview of Quality Rollup * February 2020 Security and Quality Rollup

4 comments

Comments are closed. Login to edit/delete your existing comments

  • Avatar
    Johan Appelgren

    CVE links do not work. Probably because they lead to msrc-portal-preview.azurewebsites.net that isn’t, I’m guessing, public. Replacing the host name in the urls with portal.msrc.microsoft.com works though.

  • Avatar
    Ismail Demir

    Hello Tara,

    can you please create a new rollup for Windows7/8 for all those dotnet patches to be installed/integrated?

    Every month there is a lot of security issues with dotnet. Because dozen of the dotnet patches have to be installed seperately and will fail if not prepared correctly. Thats why we have now “monthly updates” since 4 years.

    A new rollup with every dotnet patches are very welcome. Maybe also for Remote Desktop Protokoll too because of different versions like 7.1/8/8.1 and to be prepared correctly.

    Thank you.
    Ismail