This update is included in the June 2018 Preview of the Quality Rollups for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7 and 4.7.1 for Windows Server 2012 (KB 4291495). Parts of this update was previously included in the Security and Quality rollup (KB 4099634) on May 8, 2018 and Preview of Quality rollup (KB 4098968) on May 15, 2018.
This update resolves a vulnerability in Microsoft .NET Framework that could cause denial of service when .NET Framework and .NET core components process XML documents incorrectly. An attacker who has successfully exploited this vulnerability could cause a denial of service against a .NET Framework application. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-0765.Additionally, this update resolves a security feature bypass vulnerability in Windows that could allow an attacker to bypass Device Guard. An attacker who successfully exploits this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the computer. To learn more about this vulnerability, see Microsoft Common Vulnerabilities and Exposures CVE-2018-1039.Important
The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.