Lucene search

K
mskbMicrosoftKB5033917
HistoryMar 22, 2024 - 7:00 a.m.

January 9, 2024-KB5033917 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system, version 23H2

2024-03-2207:00:00
Microsoft
support.microsoft.com
8
microsoft server os
.net framework
security update
reliability improvement
version 23h2
cve-2023-36042
cve-2024-0056
cve-2024-0057
cve-2024-21312
remote code execution

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

83.1%

January 9, 2024-KB5033917 Cumulative Update for .NET Framework 3.5 and 4.8.1 for Microsoft server operating system, version 23H2

Release Date:
January 9, 2024 Version: ** .NET Framework 3.5 and 4.8.1**

The January 9, 2024 update for Microsoft server operating system, version 23H2 includes security and cumulative reliability improvements in .NET Framework 3.5 and 4.8.1. We recommend that you apply this update as part of your regular maintenance routines. Before you install this update, see the Prerequisites and Restart requirement sections.

Summary

Security Improvements CVE-2023-36042 – .NET Framework Denial of Service Vulnerability
This security update addresses a security feature bypass vulnerability detailed in CVE-2023-36042. CVE-2024-0056 – .NET Framework Security Feature Bypass Vulnerability
This security update addresses a security feature bypass vulnerability detailed in CVE-2024-0056 . CVE-2024-0057 – .NET Framework Security Feature Vulnerability
This security update addresses a elevation of privilege vulnerability detailed in CVE-2024-0057. CVE-2024-21312 – .NET Framework Denial of Service Vulnerability
This security update addresses a denial of service vulnerability detailed in CVE-2024-21312 . .NET Framework Remote Code Execution Vulnerability
This security update addresses a remote code execution vulnerability to HTTP .NET remoting server channel chain. Quality and Reliability ImprovementsThere are no new Quality and Reliability Improvements in this update.

Known issues in this update

Microsoft is not currently aware of any issues in this update.

How to get this update

Install this update****Release Channel Available Next Step
Windows Update and Microsoft Update Yes None. This update will be downloaded and installed automatically from Windows Update.
Windows Update for Business Yes None. This update will be downloaded and installed automatically from Windows Update.
Microsoft Update Catalog Yes To get the standalone package for this update, go to the Microsoft Update Catalog website.
Windows Server Update Services (WSUS) Yes This update will automatically sync with WSUS if you configure as follows: Product: Microsoft server operating system, version 23H2Classification: Security Updates File information For a list of the files that are provided in this update, download the file information for cumulative update.

Prerequisites

To apply this update, you must have .NET Framework 3.5 or 4.8.1 installed.

Restart requirement

You must restart the computer after you apply this update if any affected files are being used. We recommend that you exit all .NET Framework-based applications before you apply this update.

How to obtain help and support for this update

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

83.1%