{"id":6152,"date":"2018-07-11T12:15:39","date_gmt":"2018-07-11T10:15:39","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=6152"},"modified":"2024-10-01T15:15:46","modified_gmt":"2024-10-01T13:15:46","slug":"net-framework-update-kb4340558-drops-error-0x80092004","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2018\/07\/11\/net-framework-update-kb4340558-drops-error-0x80092004\/","title":{"rendered":".Net Framework: Update KB4340558 drops error 0x80092004?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline; border-width: 0px;\" title=\"Update\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" alt=\"Windows Update\" width=\"54\" height=\"54\" align=\"left\" border=\"0\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2018\/07\/11\/net-framework-update-kb4340558-fehlerhaft-error-0x80092004\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Last night Microsoft released the .NET Framework update KB4340558 for Windows. As it looks, this update is buggy and cannot be installed. The installation ends (on some systems) 0x80092004. <strong>Addendum:<\/strong> Microsoft has published workarounds &#8211; see addendum below.<\/p>\n<p><!--more--><\/p>\n<h2>.Net Framework update KB4340558<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/ba446459ea6246cb9f4e004fa985bf9d\" alt=\"\" width=\"1\" height=\"1\" \/>.Net Framework update <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4340558\/security-and-quality-rollup-updates-for-net-framework-3-5-sp1-4-5-2-4\" target=\"_blank\" rel=\"noopener\">KB4340558<\/a> (Security and Quality Rollup updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, and 4.7.1 for Windows 8.1, RT 8.1, and Server 2012 R2) is available for the above framework versions. The security update is intended to fix the following vulnerabilities.<\/p>\n<ul>\n<li>A \"remote code execution\" vulnerability exists when .NET Framework does not validate input correctly. An attacker who successfully exploits this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. Users whose accounts are configured to have fewer user rights on the system could be less affected than users who have administrative user rights. To exploit the vulnerability, an attacker would have to pass specific input to an application through susceptible .NET Framework methods. This security update addresses the vulnerability by correcting how .NET Framework validates input. To learn more about this vulnerability, see <a href=\"https:\/\/portal.msrc.microsoft.com\/security-guidance\/advisory\/CVE-2018-8284\" target=\"_blank\" rel=\"noopener\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8284<\/a>.<\/li>\n<li>An \"elevation of privilege\" vulnerability exists in .NET Framework that could allow an attacker to elevate their user rights level. To exploit the vulnerability, an attacker would first have to access the local computer, and then run a malicious program. This update addresses the vulnerability by correcting how .NET Framework enables COM objects. To learn more about this vulnerability, see <a href=\"https:\/\/web.archive.org\/web\/20201005080830\/https:\/\/portal.msrc.microsoft.com\/security-guidance\/advisory\/CVE-2018-8202\" target=\"_blank\" rel=\"noopener\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8202<\/a>.<\/li>\n<li>A \"security feature bypass\" vulnerability exists when .NET Framework components do not correctly validate certificates. An attacker could present expired certificates when challenged. This security update addresses the vulnerability by making sure that .NET Framework components correctly validate certificates. To learn more about this vulnerability, see <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2018-8356\" target=\"_blank\" rel=\"noopener\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8356<\/a>.<\/li>\n<\/ul>\n<p>The specified security fixes therefore suggest that you install this security update quickly.<\/p>\n<h2>Installation Fails with Error 0x80092004<\/h2>\n<p>German blog reader Markus B. contacted me today via e-mail (thanks) and described his observation.<\/p>\n<blockquote><p>KB4340558 is running on error. 60 PCs cannot install it. Find also already the first forum posts to it. Don't seem like the only one.<\/p><\/blockquote>\n<blockquote><p>\"2018-07 Security and Quality Rollup for.NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 under Windows 8.1 and Server 2012 R2 for x64 (KB4340558)\". It has error code 80092004.\"<\/p><\/blockquote>\n<p>A 2nd blog reader from Greece reported the same to me via e-mail. Currently ther is only a German <a href=\"https:\/\/www.windows-info.de\/threads\/windows-update-laesst-sich-nicht-installieren.57137\/\" target=\"_blank\" rel=\"noopener\">forum post<\/a>, describing the same error. Also downloading the package from Microsoft Update Catalog and install ist manually, ends with the error dialog shown below.<\/p>\n<p><img decoding=\"async\" title=\"Update KB4340558 Installationsfehler\" src=\"https:\/\/i.imgur.com\/3P3aj20.jpg\" alt=\"Update KB4340558 Installationsfehler\" \/><\/p>\n<p>However, Markus B. wrote, that he received an install error code 0x80092004 (not shown above), which should be found in the event logs. Error code 0x80092004 stands for CRYPT_E_NOT_FOUND, 'The object or property was not found'. This indicates that something was not found within the package. I assume that Microsoft broke something within the package and have to re-release a new version.<\/p>\n<h2>Further details<\/h2>\n<p>Below user Valter left a comment, shedding a bit light into that issue. I mentioned the CRYPT_E_NOT_FOUND meaning for error code 0x80092004. Blog reader Valter found the following entry within his event log:<\/p>\n<blockquote><p>\"Couldn't find the hash of component: NetFx4-PenIMC\"<\/p><\/blockquote>\n<p>So it seems that one part of the update is missing a has value, so the update installer refuse the package. PenIMC stands obviously for a pen component (Pen Input Mode Component?).<\/p>\n<p>For curiosity I went to Microsoft Update Catalog and tried to download <a href=\"https:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=KB4340558\" target=\"_blank\" rel=\"noopener\">KB4340558<\/a>. The goal was to analyze the package.<\/p>\n<p><img decoding=\"async\" title=\"Components of Update KB4340558\" src=\"https:\/\/i.imgur.com\/DnViZXB.jpg\" alt=\"Components of Update KB4340558\" \/><\/p>\n<p>Microsoft Update Catalog offered me three .msu packes. Blog reader Valter wrote below in a comment, that he wasn't able to install the .msu files. There is a Russian Technet forum thread, where KB4338424, KB4338415 and KB4338419 are mentioned also. While KB4338424 and KB4338415 installs for this user, KB4338419 creates the install error.<\/p>\n<p>I read also some forum posts (see <a href=\"https:\/\/community.spiceworks.com\/topic\/2147429-kb4340558-error-80092004-on-server-2012\" target=\"_blank\" rel=\"noopener\">here at spiceworks<\/a>), where users are claiming, that the update installs on Windows Server 2012 R2 without a flaw. Due to the fact, that we have a cumulative update, it's explainable, that not all Windows 8.1 and Windows Server 2012 R2 systems will fail. Some are probably patched, while on others updating <em>NetFx4-PenIMC <\/em>fails due to the missing hash value.<\/p>\n<h3>What helped some users<\/h3>\n<p>Addendum:\u00a0At askwoody.com there is <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202831\" target=\"_blank\" rel=\"noopener\">this forum post<\/a>, where a user wrote, that entering the command below in an administrative command prompt windows helped.<\/p>\n<p><em>Dism \/Online \/NoRestart \/Cleanup-Image \/StartComponentCleanup<\/em><\/p>\n<p>Just try it and reboot Windows. If it works, it's fine, but I'm skeptical.<\/p>\n<blockquote><p><strong>Addendum:<\/strong> At askwoody.com user abbodi86 <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202958\" target=\"_blank\" rel=\"noopener\">pointed out<\/a>: 'but running DISM is not enough,\u00a0KB4229727 &amp; KB4096417 must be uninstalled beforehand.<\/p><\/blockquote>\n<h2>Sum it up and final recommendations<\/h2>\n<p>Before I wrote the blog post, I've 3 different cases, where this update fails during installation on Windows 8.1 clients or Windows Server 2012 R2. After publishing the German and English article, I received another 8 confirmations of this error so far. There are also posts at <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/windows8_1-update\/windows-81-update-kb4340558-fails-with-error-code\/c563a723-01d7-4859-a07e-717647b8ea14\" target=\"_blank\" rel=\"noopener\">Microsoft answers<\/a>, at <a href=\"https:\/\/www.askwoody.com\/forums\/topic\/july-2018-security-patches-are-out\/#post-202787\" target=\"_blank\" rel=\"noopener\">askwoody<\/a> and <a href=\"https:\/\/community.spiceworks.com\/topic\/2147429-kb4340558-error-80092004-on-server-2012\" target=\"_blank\" rel=\"noopener\">spicework community<\/a>.<\/p>\n<p>All approaches as using <em>sfc \/scannow <\/em>and <em>dism<\/em>, to repair Windows system files and component store, or delete the update store, won't help. Also an attempt to install the package from a download via the .msu file will fail. Currently my recommendation is to hide the update, and wait until Microsoft releases a revised patch or recommendations to fix the install issue. I've escalated the issue within this <a href=\"https:\/\/answers.microsoft.com\/en-us\/windows\/forum\/windows8_1-update\/windows-81-update-kb4340558-fails-with-error-code\/c563a723-01d7-4859-a07e-717647b8ea14\" target=\"_blank\" rel=\"noopener\">Microsoft answers<\/a> forum thread, and I created this Technet forum thread \u2013 let's hope that help. If you are affected, you can leave a comment. If a solution is known, also.<\/p>\n<h2>Addendum: Microsoft confirmed the issue<\/h2>\n<p>Microsoft has added a 'known issues' section to <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4340558\/security-and-quality-rollup-updates-for-net-framework-3-5-sp1-4-5-2-4\" target=\"_blank\" rel=\"noopener\">KB4340558<\/a> with the following text:<\/p>\n<blockquote><p>Users receive a \"0x80092004\" error when they try to install the July 2018 Security and Quality Rollup update KB4340557 or KB4340558 on Windows 8.1, Windows Server 2012 R2, or Windows Server 2012 after they install the June 2018 .NET Framework Preview of Quality Rollup updates KB4291497 or KB4291495 on systems that are running on .NET Framework 4.7.2, 4.7.1, 4.7, 4.62, 4.6.1, or 4.6.<\/p><\/blockquote>\n<p>So it may be helpful, to uninstall\u00a0KB4291497 or KB4291495.<\/p>\n<h2>Microsoft published workarounds<\/h2>\n<p>On July 13, 2018 Microsoft published the article\u00a0<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4345232\/0x80092004-error-and-updates-kb4340557-and-kb4340558-don-t-install-aft\" target=\"_blank\" rel=\"noopener\">\"0x80092004\" error occurs and July 2018 .NET Security and Quality Rollup update KB4340557 or KB4340558 does not install after you apply June update KB4291497 or KB4291495<\/a>\u00a0with workarounds for this issue (thx JR for the <a href=\"https:\/\/borncity.com\/win\/2018\/07\/11\/net-framework-update-kb4340558-drops-error-0x80092004\/#comment-3414\">comment<\/a>). But I should note, that I got feedback from some affected users, where Microsoft's fix doesn't help.<\/p>\n<h2>Microsoft published a revised update<\/h2>\n<p>Microsoft released a revised Update on July 19, 2018, see my blog post\u00a0<a href=\"https:\/\/borncity.com\/win\/2018\/07\/20\/revised-net-framework-update-kb4340558-july-19-2018\/\" rel=\"bookmark\">Revised .NET Framework Update KB4340558 (July 19, 2018)<\/a>. Some users are reporting, that this update will install without error\u00a00x80092004.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Last night Microsoft released the .NET Framework update KB4340558 for Windows. As it looks, this update is buggy and cannot be installed. The installation ends (on some systems) 0x80092004. Addendum: Microsoft has published workarounds &#8211; see addendum below.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[463,580,22,2],"tags":[584,1515,47,69,1514,23],"class_list":["post-6152","post","type-post","status-publish","format-standard","hentry","category-issue","category-security","category-update","category-windows","tag-net-framework","tag-error-0x80092004","tag-issue","tag-security","tag-update-kb4340558","tag-windows-8-1"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=6152"}],"version-history":[{"count":2,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6152\/revisions"}],"predecessor-version":[{"id":35144,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/6152\/revisions\/35144"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=6152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=6152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=6152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}