MS18-MAY8 Bulletin Details
Bulletin ID MS18-MAY8
Title Security Update for .NET Framework (KB4095875)
Summary A security feature bypass vulnerability exists in .Net Framework which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerability by correcting how .Net Framework instantiates COM objects.
Knowledgebase 4095875

List of Patches

S.No Patch Name Severity
1Windows6.0-kb4095513-x86.msuImportant
2Windows6.0-kb4095873-x86.msuImportant
3Windows6.0-kb4095513-x64.msuImportant
4Windows6.0-kb4095873-x64.msuImportant
5Windows8.1-kb4095515-x86.msuImportant
6Windows8.1-kb4095875-x86.msuImportant
7Windows6.1-kb4095514-x86.msuImportant
8Windows6.1-kb4095874-x86.msuImportant
9Windows8-rt-kb4095872-x64.msuImportant
10Windows8-rt-kb4095512-x64.msuImportant
11Windows8.1-kb4095515-x64.msuImportant
12Windows6.1-kb4095514-x64.msuImportant
13Windows8.1-kb4095875-x64.msuImportant
14windows6.1-kb4095874-x64.msuImportant
15ndp47-kb4096237-x64-2008R2.exeImportant
16ndp45-kb4095519-x86.exeImportant
17ndp45-kb4095519-x64.exeImportant
18Windows8-rt-kb4096494-x64.msuImportant
19Windows8-rt-kb4095518-x64.msuImportant
20Windows8.1-kb4095517-x86.msuImportant
21ndp45-kb4096495-x64.exeImportant
22ndp45-kb4096495-x86.exeImportant
23Windows8.1-kb4095517-x64.msuImportant
24Windows8.1-kb4095876-x86.msuImportant
25Windows8.1-kb4095876-x64.msuImportant
26Windows8-rt-kb4096416-x64.msuImportant
27ndp47-kb4096237-x86.exeImportant
28Windows8-rt-kb4096235-x64.msuImportant
29ndp47-kb4096237-x64.exeImportant
30Windows8.1-kb4096236-x86.msuImportant
31Windows8.1-kb4096236-x64.msuImportant
32ndp47-kb4096418-x86.exeImportant
33ndp47-kb4096418-x64.exeImportant
34Windows8.1-kb4096417-x86.msuImportant
35Windows8.1-kb4096417-x64.msuImportant
36ndp47-kb4096418-x64-2008R2.exeImportant

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.