Lucene search

K
mskbMicrosoftKB5029918
HistoryOct 10, 2023 - 12:00 a.m.

September 12, 2023-KB5029918 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system, version 23H2

2023-10-1000:00:00
Microsoft
support.microsoft.com
2
microsoft
.net framework
security
update
operating system

8.2 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

44.5%

September 12, 2023-KB5029918 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system, version 23H2

Release Date:
September 12, 2023 Version: ** .NET Framework 3.5 and 4.8.1**

The September 12, 2023 update for Microsoft server operating system, version 23H2 includes security and cumulative reliability improvements in .NET Framework 3.5 and 4.8.1. We recommend that you apply this update as part of your regular maintenance routines. Before you install this update, see the Prerequisites and Restart requirement sections.

Summary

Security Improvements CVE-2023-36796 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE 2023-36796. CVE-2023-36792 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36792. CVE-2023-36793 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36793. CVE-2023-36794 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in DiaSymReader.dll when reading a corrupted PDB file which can lead to Remote Code Execution. For more information see CVE-2023-36794. CVE-2023-36788 - .NET Framework Remote Code Execution Vulnerability
This security update addresses a vulnerability in the WPF XAML parser where an unsandboxed parser can lead to remote code execution. For more information see CVE 2023-36788.Quality and Reliability ImprovementsThere are no new Quality and Reliability Improvements in this update.

Known issues in this update

Microsoft is not currently aware of any issues in this update.

How to get this update

Install this update****Release Channel Available Next Step
Windows Update and Microsoft Update Yes None. This update will be downloaded and installed automatically from Windows Update.
Windows Update for Business Yes None. This update will be downloaded and installed automatically from Windows Update.
Microsoft Update Catalog Yes To get the standalone package for this update, go to the Microsoft Update Catalog website.
Windows Server Update Services (WSUS) Yes This update will automatically sync with WSUS if you configure as follows: Product: Microsoft server operating system, version 23H2Classification: Security Updates File information For a list of the files that are provided in this update, download the file information for cumulative update.

Prerequisites

To apply this update, you must have .NET Framework 3.5 or 4.8.1 installed.

Restart requirement

You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

How to obtain help and support for this update