{"id":17605,"date":"2018-05-08T14:18:17","date_gmt":"2018-05-08T21:18:17","guid":{"rendered":"https:\/\/blogs.msdn.microsoft.com\/dotnet\/?p=17605"},"modified":"2021-09-29T16:25:53","modified_gmt":"2021-09-29T23:25:53","slug":"net-framework-may-2018-security-and-quality-rollup","status":"publish","type":"post","link":"https:\/\/devblogs.microsoft.com\/dotnet\/net-framework-may-2018-security-and-quality-rollup\/","title":{"rendered":".NET Framework May 2018 Security and Quality Rollup"},"content":{"rendered":"<p>Today, we are releasing the May 2018 Security and Quality Rollup.<\/p>\n<h2><a href=\"#security\" id=\"user-content-security\" class=\"anchor\"><\/a>Security<\/h2>\n<h3><a href=\"#cve-2018-1039--windows-security-feature-bypass-vulnerability\" id=\"user-content-cve-2018-1039--windows-security-feature-bypass-vulnerability\" class=\"anchor\"><\/a>CVE-2018-1039 \u2013 Windows Security Feature Bypass Vulnerability<\/h3>\n<p>A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerability by correcting how Windows validates User Mode Code Integrity policies<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-1039\">CVE-2018-1039<\/a><\/p>\n<h3><a href=\"#cve-2018-0765--net-and-net-core-denial-of-service-vulnerability\" id=\"user-content-cve-2018-0765--net-and-net-core-denial-of-service-vulnerability\" class=\"anchor\"><\/a>CVE-2018-0765 \u2013 .NET and .NET Core Denial Of Service Vulnerability<\/h3>\n<p>A Denial of Service vulnerability exists when .NET, and .NET core, improperly process XML documents. An attacker who successfully exploited this vulnerability could cause a denial of service against a .NET application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to a .NET(or .NET core) application.<\/p>\n<p>The update addresses the vulnerability by correcting how a .NET, and .NET core, applications handles XML document processing.<\/p>\n<p><a href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2018-0765\">CVE-2018-0765<\/a><\/p>\n<h2><a href=\"#quality-and-reliability\" id=\"user-content-quality-and-reliability\" class=\"anchor\"><\/a>Quality and Reliability<\/h2>\n<p>This release contains the following quality and reliability improvements.<\/p>\n<h4><a href=\"#clr\" id=\"user-content-clr\" class=\"anchor\"><\/a>CLR<\/h4>\n<ul>\n<li>Floating-point overflow in the thread pool\u2019s hill climbing algorithm. [569602]<\/li>\n<li>High CPU usage in a kernel lock ntoskrnl!ExpWaitForSpinLockExclusiveAndAcquire called by ntoskrnl!KiPageFault is resolved by CLR implemented write watch instead [568318]<\/li>\n<\/ul>\n<p>Note: Additional information on these improvements is not available. The VSTS bug number provided with each improvement is a unique ID that you can give Microsoft Customer Support, include in StackOverflow comments or use in web searches.<\/p>\n<h2><a href=\"#getting-the-update\" id=\"user-content-getting-the-update\" class=\"anchor\"><\/a>Getting the Update<\/h2>\n<p>The Security and Quality Rollup is available via Windows Update, Windows Server Update Services, Microsoft Update Catalog, and Docker.<\/p>\n<h3><a href=\"#microsoft-update-catalog\" id=\"user-content-microsoft-update-catalog\" class=\"anchor\"><\/a>Microsoft Update Catalog<\/h3>\n<p>You can get the update via the Microsoft Update Catalog. For Windows 10, .NET Framework updates are part of the Windows 10 Monthly Rollup.<\/p>\n<p>The following table is for Windows 10 and Windows Server 2016+.<\/p>\n<table>\n<thead>\n<tr>\n<th>Product Version<\/th>\n<th>Security and Quality Rollup KB<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Windows 10 1803 (April 2018 Update)<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4103721\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4103721\" rel=\"nofollow\">4103721<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 3.5<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103721\" rel=\"nofollow\">4103721<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.7.2<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103721\" rel=\"nofollow\">4103721<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Windows 10 1709 (Fall Creators Update)<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4103727\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4103727\" rel=\"nofollow\">4103727<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 3.5<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103727\" rel=\"nofollow\">4103727<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.7.1<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103727\" rel=\"nofollow\">4103727<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Windows 10 1703 (Creators Update)<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4103731\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4103731\" rel=\"nofollow\">4103731<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 3.5<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103731\" rel=\"nofollow\">4103731<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.7, 4.7.1<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103731\" rel=\"nofollow\">4103731<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Windows 10 1607 (Anniversary Update)\nWindows Server 2016<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4103723\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4103723\" rel=\"nofollow\">4103723<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 3.5<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103723\" rel=\"nofollow\">4103723<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.6.2, 4.7, 4.7.1<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103723\" rel=\"nofollow\">4103723<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Windows 10 1507<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4103716\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4103716\" rel=\"nofollow\">4103716<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 3.5<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103716\" rel=\"nofollow\">4103716<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.6, 4.6.1, 4.6.2<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4103716\" rel=\"nofollow\">4103716<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The following table is for earlier Windows and Windows versions.<\/p>\n<table>\n<thead>\n<tr>\n<th>Product Version<\/th>\n<th>Security and Quality Rollup KB<\/th>\n<th>Security Rollup KB<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Windows 8.1\nWindows RT 8.1\nWindows Server 2012 R2<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4099635\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4099635\" rel=\"nofollow\">4099635<\/a><\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4099639\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4099639\" rel=\"nofollow\">4099639<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 3.5<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095875\" rel=\"nofollow\">4095875<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095515\" rel=\"nofollow\">4095515<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.5.2<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095876\" rel=\"nofollow\">4095876<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095517\" rel=\"nofollow\">4095517<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096417\" rel=\"nofollow\">4096417<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096236\" rel=\"nofollow\">4096236<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Windows Server 2012<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4099634\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4099634\" rel=\"nofollow\">4099634<\/a><\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4099638\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4099638\" rel=\"nofollow\">4099638<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 3.5<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095872\" rel=\"nofollow\">4095872<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095512\" rel=\"nofollow\">4095512<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.5.2<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096494\" rel=\"nofollow\">4096494<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095518\" rel=\"nofollow\">4095518<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096416\" rel=\"nofollow\">4096416<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096235\" rel=\"nofollow\">4096235<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Windows 7\nWindows Server 2008 R2<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4099633\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4099633\" rel=\"nofollow\">4099633<\/a><\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4099637\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4099637\" rel=\"nofollow\">4099637<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 3.5.1<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095874\" rel=\"nofollow\">4095874<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095514\" rel=\"nofollow\">4095514<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.5.2<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096495\" rel=\"nofollow\">4096495<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095519\" rel=\"nofollow\">4095519<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096418\" rel=\"nofollow\">4096418<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096237\" rel=\"nofollow\">4096237<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Windows Server 2008<\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4099636\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4099636\" rel=\"nofollow\">4099636<\/a><\/strong><\/td>\n<td><strong><a href=\"http:\/\/www.catalog.update.microsoft.com\/Search.aspx?q=4099640\" rel=\"nofollow\">Catalog<\/a>\n<a href=\"https:\/\/support.microsoft.com\/kb\/4099640\" rel=\"nofollow\">4099640<\/a><\/strong><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 2.0, 3.0<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095873\" rel=\"nofollow\">4095873<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095513\" rel=\"nofollow\">4095513<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.5.2<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096495\" rel=\"nofollow\">4096495<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4095519\" rel=\"nofollow\">4095519<\/a><\/td>\n<\/tr>\n<tr>\n<td>.NET Framework 4.6<\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096418\" rel=\"nofollow\">4096418<\/a><\/td>\n<td><a href=\"https:\/\/support.microsoft.com\/kb\/4096237\" rel=\"nofollow\">4096237<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><a href=\"#docker-images\" id=\"user-content-docker-images\" class=\"anchor\"><\/a>Docker Images<\/h3>\n<p>We are updating the following .NET Framework Docker images for today&#8217;s release:<\/p>\n<ul>\n<li><a href=\"https:\/\/hub.docker.com\/r\/microsoft\/aspnet\/\" rel=\"nofollow\">microsoft\/aspnet<\/a><\/li>\n<li><a href=\"https:\/\/hub.docker.com\/r\/microsoft\/dotnet-framework\/\" rel=\"nofollow\">microsoft\/dotnet-framework<\/a><\/li>\n<li><a href=\"https:\/\/hub.docker.com\/r\/microsoft\/dotnet-framework-samples\/\" rel=\"nofollow\">microsoft\/dotnet-framework-samples<\/a><\/li>\n<\/ul>\n<p>Note: Look at the &#8220;Tags&#8221; view in each repository to see the updated Docker image tags.<\/p>\n<h3><a href=\"#previous-monthly-rollups\" id=\"user-content-previous-monthly-rollups\" class=\"anchor\"><\/a>Previous Monthly Rollups<\/h3>\n<p>The last few .NET Framework Monthly updates are listed below for your convenience:<\/p>\n<ul>\n<li><a href=\"https:\/\/blogs.msdn.microsoft.com\/dotnet\/2018\/02\/13\/net-framework-february-2018-security-and-quality-rollup\/\" rel=\"nofollow\">February 2018 Security and Quality Rollup<\/a><\/li>\n<li><a href=\"https:\/\/blogs.msdn.microsoft.com\/dotnet\/2018\/01\/26\/january-2018-preview-of-quality-rollup\/\" rel=\"nofollow\">January 2018 Preview of Quality Rollup<\/a><\/li>\n<li><a href=\"https:\/\/blogs.msdn.microsoft.com\/dotnet\/2018\/01\/09\/net-framework-january-2018-security-and-quality-rollup\/\" rel=\"nofollow\">January 2018 Security and Quality Rollup<\/a><\/li>\n<li><a href=\"https:\/\/blogs.msdn.microsoft.com\/dotnet\/2017\/11\/14\/net-framework-november-2017-security-and-quality-rollup\/\" rel=\"nofollow\">November 2017 Security and Quality Rollup<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Today, we are releasing the May 2018 Security and Quality Rollup. Security CVE-2018-1039 \u2013 Windows Security Feature Bypass Vulnerability A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. [&hellip;]<\/p>\n","protected":false},"author":336,"featured_media":58792,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[685],"tags":[],"class_list":["post-17605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dotnet"],"acf":[],"blog_post_summary":"<p>Today, we are releasing the May 2018 Security and Quality Rollup. Security CVE-2018-1039 \u2013 Windows Security Feature Bypass Vulnerability A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. [&hellip;]<\/p>\n","_links":{"self":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts\/17605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/users\/336"}],"replies":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/comments?post=17605"}],"version-history":[{"count":0,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/posts\/17605\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/media\/58792"}],"wp:attachment":[{"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/media?parent=17605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/categories?post=17605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devblogs.microsoft.com\/dotnet\/wp-json\/wp\/v2\/tags?post=17605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}