This update is included in the June 2018 Preview of the Quality Rollups for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7 and 4.7.1 for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB 4291497). Parts of this update was previously included in the Security and Quality rollup (KB 4099635) on May 8, 2018 and Preview of Quality rollup (KB 4103473) on May 15, 2018.
This update resolves a vulnerability in Microsoft .NET Framework that could allow a Denial of Service attack when .NET Framework and .NET core components process XML documents incorrectly. An attacker who successfully exploits this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765.Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.Important
The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.