None
## Improvements and fixes
This update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:
* Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel® Core® processors and Intel® Xeon® processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) guidance KB article. (_These registry settings are enabled by default for Windows Client OS editions._)
* Addresses additional issues with updated time zone information.
* Addresses an issue that prevents users from unlocking their computer if their password has expired. This issue occurs when fast user switching has been disabled and the user has locked the computer.
* Updates support for the draft version of the Token Binding protocol v0.16.
* Addresses an issue in which decrypted data fails to clear from memory, in some cases, after a CAPI decryption operation was completed.
* Ensures that Internet Explorer and Microsoft Edge support the preload="none" tag.
* Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) _and_ a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is “This module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement”. For more information, see [https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200](<https://na01.safelinks.protection.outlook.com/?url=https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=kSZ7s7nk9hHky/03rwqdcaoAMJdwJwd%2BsltaI4ODW/s%3D&reserved=0>) and [https://aka.ms/PSModuleFunctionExport](<https://na01.safelinks.protection.outlook.com/?url=https://aka.ms/PSModuleFunctionExport&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=muUIr/qbRp8/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&reserved=0>).
* Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of “access denied,” “class not registered,” or “internal failure occurred for unknown reasons” errors.
* Addresses a vulnerability issue by correcting the way that the .NET Framework handles high-load or high-density network connections. For more information, see [CVE-2018-8360](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fsecurity-guidance%2Fadvisory%2FCVE-2018-8360&data=02%7C01%7C%7C111dc7208a70414e6bee08d602d7ad2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636699522675716939&sdata=LgAttISSbu40x0et1EFqQUqJAPTJGmmqTdB6foyZAZ8%3D&reserved=0>).
* Extends the Key Management Service (KMS) to support the upcoming Windows 10 client Enterprise LTSC and Windows Server editions. For more information, see KB4347075.
* Security updates to Windows Server.
If you installed earlier updates, only the new fixes in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).
**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 Feature Update based on device compatibility and Windows Update for Business deferral policy. This does not apply to long-term servicing editions.
## Known issues in this update
Microsoft is not currently aware of any issues with this update.
## How to get this update
This update will be downloaded and installed automatically from Windows Update. To get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343892>) website.**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4343892](<http://download.microsoft.com/download/C/D/8/CD8936B0-36F5-4487-898F-F708F7712B3C/4343892.csv>).
{"id": "KB4343892", "vendorId": null, "type": "mskb", "bulletinFamily": "microsoft", "title": "August 14, 2018\u2014KB4343892 (OS Build 10240.17946)", "description": "None\n## Improvements and fixes\n\nThis update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) guidance KB article. (_These registry settings are enabled by default for Windows Client OS editions._)\n * Addresses additional issues with updated time zone information.\n * Addresses an issue that prevents users from unlocking their computer if their password has expired. This issue occurs when fast user switching has been disabled and the user has locked the computer.\n * Updates support for the draft version of the Token Binding protocol v0.16.\n * Addresses an issue in which decrypted data fails to clear from memory, in some cases, after a CAPI decryption operation was completed.\n * Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.\n * Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) _and_ a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is \u201cThis module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement\u201d. For more information, see [https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200](<https://na01.safelinks.protection.outlook.com/?url=https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=kSZ7s7nk9hHky/03rwqdcaoAMJdwJwd%2BsltaI4ODW/s%3D&reserved=0>) and [https://aka.ms/PSModuleFunctionExport](<https://na01.safelinks.protection.outlook.com/?url=https://aka.ms/PSModuleFunctionExport&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=muUIr/qbRp8/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&reserved=0>).\n * Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \u201caccess denied,\u201d \u201cclass not registered,\u201d or \u201cinternal failure occurred for unknown reasons\u201d errors.\n * Addresses a vulnerability issue by correcting the way that the .NET Framework handles high-load or high-density network connections. For more information, see [CVE-2018-8360](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fsecurity-guidance%2Fadvisory%2FCVE-2018-8360&data=02%7C01%7C%7C111dc7208a70414e6bee08d602d7ad2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636699522675716939&sdata=LgAttISSbu40x0et1EFqQUqJAPTJGmmqTdB6foyZAZ8%3D&reserved=0>).\n * Extends the Key Management Service (KMS) to support the upcoming Windows 10 client Enterprise LTSC and Windows Server editions. For more information, see KB4347075.\n * Security updates to Windows Server.\nIf you installed earlier updates, only the new fixes in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 Feature Update based on device compatibility and Windows Update for Business deferral policy. This does not apply to long-term servicing editions.\n\n## Known issues in this update\n\nMicrosoft is not currently aware of any issues with this update.\n\n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343892>) website.**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4343892](<http://download.microsoft.com/download/C/D/8/CD8936B0-36F5-4487-898F-F708F7712B3C/4343892.csv>).\n", "published": "2018-08-14T07:00:00", "modified": "2018-08-14T07:00:00", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 7.6}, "severity": "HIGH", "exploitabilityScore": 4.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "href": "https://support.microsoft.com/en-us/help/4343892", "reporter": "Microsoft", "references": [], "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8200", "CVE-2018-8360", "CVE-2018-8385"], "immutableFields": [], "lastseen": "2023-01-11T10:40:54", "viewCount": 43, "enchantments": {"dependencies": {"references": [{"type": "amazon", "idList": ["ALAS-2018-1058", "ALAS2-2018-1058"]}, {"type": "apple", "idList": ["APPLE:395E729CF93F555C415D358DB1C43E9A", "APPLE:E110ECBEC1B5F4EBE4C6799FF1A4F4E0", "APPLE:HT209139", "APPLE:HT209193"]}, {"type": "attackerkb", "idList": ["AKB:001CB404-1682-4FD7-B92D-30CD4458A763", "AKB:1CD74414-56D3-45DD-B746-BDDAECACC253", "AKB:A0E0FC5B-6917-41AA-AA5D-5F7A5E98996D", "AKB:D2380257-7D97-4A85-961C-A25C70361E50"]}, {"type": "centos", "idList": ["CESA-2018:2384", "CESA-2018:2390"]}, {"type": "cert", "idList": ["VU:982149"]}, {"type": "cisco", "idList": ["CISCO-SA-20180814-CPUSIDECHANNEL"]}, {"type": "citrix", "idList": ["CTX236548"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:32C77274978FD738E63CD47FF8AF1676", "CFOUNDRY:B6F9117DDC7188793F0CD8F25AB1B9C7", "CFOUNDRY:FE675C625F5EEDC7C5C065721F8F1D96"]}, {"type": "cve", "idList": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8200", "CVE-2018-8204", "CVE-2018-8353", "CVE-2018-8355", "CVE-2018-8359", "CVE-2018-8360", "CVE-2018-8371", "CVE-2018-8372", "CVE-2018-8373", "CVE-2018-8385", "CVE-2018-8389", "CVE-2018-8390"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1481-1:EB6C9", "DEBIAN:DLA-1506-1:91878", "DEBIAN:DLA-1506-1:B3A8C", "DEBIAN:DSA-4274-1:19FA6", "DEBIAN:DSA-4279-1:280AD", "DEBIAN:DSA-4279-1:66DD9"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-3620", "DEBIANCVE:CVE-2018-3646"]}, {"type": "f5", "idList": ["F5:K31300402", "F5:K70675920", "F5:K95275140"]}, {"type": "fedora", "idList": ["FEDORA:122AE604D3F9", "FEDORA:1CAC0608E6F2", "FEDORA:1EFAB60ACFB0", "FEDORA:2429C641CB6F", "FEDORA:250CB6087A80", "FEDORA:29049600CFF3", "FEDORA:2C89F6167407", "FEDORA:3266960F0E44", "FEDORA:37B8362B00D0", "FEDORA:41B546014626", "FEDORA:42DA3601FD86", "FEDORA:445816021736", "FEDORA:4D5AD601FDAC", "FEDORA:50E6E6087656", "FEDORA:5267F604C2BD", "FEDORA:5D742610B071", "FEDORA:6B39A60C690C", "FEDORA:6B66A6047312", "FEDORA:728DA604CD72", "FEDORA:7640C641CB61", "FEDORA:87BD56087904", "FEDORA:8F974604E846", "FEDORA:95A686085F81", "FEDORA:9E3D9606D195", "FEDORA:AC7FC600CFCA", "FEDORA:B395E6087A9D", "FEDORA:B87B460876BA", "FEDORA:BBFE360460D0", "FEDORA:BD35260BC96F", "FEDORA:C49D061F375F", "FEDORA:C64AE6007F37", "FEDORA:C65F560874BD", "FEDORA:D5F726042B1F", "FEDORA:D6CAE607A456", "FEDORA:D6F86601E6D9", "FEDORA:E37FD60924F1", "FEDORA:E5291607602A", "FEDORA:E93AE6077DCD", "FEDORA:EBB026048D2E"]}, {"type": "fortinet", "idList": ["FG-IR-18-002"]}, {"type": "freebsd", "idList": ["2310B814-A652-11E8-805B-A4BADB2F4699"]}, {"type": "freebsd_advisory", "idList": ["FREEBSD_ADVISORY:FREEBSD-SA-18:09.L1TF"]}, {"type": "gentoo", "idList": ["GLSA-201810-06"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20180815-01-CPU"]}, {"type": "ibm", "idList": ["4B7EBAB09AB01A6A2993819DB2589A79B0751770B2E5A63287320AA02BEF3420", "78BAD43C88F0291540D28D9B278D560FB7D643B21400003DDCF10124DD2DED21", "AED01AE411153EF61F18A5379A53E9FF22A1966A07D8367620044DFB22FE9466", "B9B157CE2F5856DDEBF84E234FD678B9A23FE2E3E41F20E5870E92B79E07079A", "BD55A0B2740E1F2CAF9976B32464B25B68B478CF5B269F51D2CBB1CBE5533C11", "CD8271F1E3A620207AA3EAC35F944E1453EFEBC4728A88B9C3D9D0DA7F511F56", "EDC4C5C80C00EE4AC9AA2C2F8FC5CF316B401A50DA42A577EE4FA380D4A47809", "F14A52FB736037E01486249E61D237CDD65B31B91BE931E3C7DE0760AAFD7ED4"]}, {"type": "intel", "idList": ["INTEL:INTEL-SA-00161"]}, {"type": "kaspersky", "idList": ["KLA11304", "KLA11305", "KLA11306", "KLA11309", "KLA11789"]}, {"type": "lenovo", "idList": ["LENOVO:PS500179-L1-TERMINAL-FAULT-SIDE-CHANNEL-VULNERABILITIES-NOSID", "LENOVO:PS500179-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2018-0344", "MGASA-2018-0345", "MGASA-2018-0346", "MGASA-2018-0347"]}, {"type": "mscve", "idList": ["MS:ADV180018", "MS:CVE-2018-8200", "MS:CVE-2018-8360", "MS:CVE-2018-8385"]}, {"type": "mskb", "idList": ["KB4073065", "KB4343205", "KB4343885", "KB4343887", "KB4343888", "KB4343896", "KB4343897", "KB4343898", "KB4343899", "KB4343900", "KB4343901", "KB4343909", "KB4344144", "KB4344145", "KB4344146", "KB4344147", "KB4344148", "KB4344149", "KB4344150", "KB4344151", "KB4344152", "KB4344153", "KB4344165", "KB4344166", "KB4344167", "KB4344171", "KB4344172", "KB4344173", "KB4344175", "KB4344176", "KB4344177", "KB4344178", "KB4345590", "KB4345591", "KB4345592", "KB4345593", "KB4345679", "KB4345680", "KB4345681", "KB4345682", "KB4457984", "KB4458010"]}, {"type": "nessus", "idList": ["700518.PRM", "AL2_ALAS-2018-1058.NASL", "ALA_ALAS-2018-1058.NASL", "CENTOS_RHSA-2018-2384.NASL", "CENTOS_RHSA-2018-2390.NASL", "CITRIX_XENSERVER_CTX236548.NASL", "DEBIAN_DLA-1481.NASL", "DEBIAN_DLA-1506.NASL", "DEBIAN_DSA-4274.NASL", "DEBIAN_DSA-4279.NASL", "EULEROS_SA-2018-1278.NASL", "EULEROS_SA-2018-1279.NASL", "EULEROS_SA-2018-1323.NASL", "EULEROS_SA-2018-1345.NASL", "EULEROS_SA-2018-1350.NASL", "EULEROS_SA-2019-1515.NASL", "F5_BIGIP_SOL31300402.NASL", "F5_BIGIP_SOL95275140.NASL", "FEDORA_2018-1C80FEA1CD.NASL", "FEDORA_2018-683DFDE81A.NASL", "FEDORA_2018-915602DF63.NASL", "FEDORA_2018-F8CBA144AE.NASL", "FREEBSD_PKG_2310B814A65211E8805BA4BADB2F4699.NASL", "GENTOO_GLSA-201810-06.NASL", "JUNIPER_SPACE_JSA10917_184R1.NASL", "MACOSX_FUSION_VMSA_2018_0020.NASL", "MACOSX_SECUPD2018-005.NASL", "MACOSX_SECUPD_10_13_6_2018-002.NASL", "MACOS_10_14.NASL", "MICROSOFT_WINDOWS_SPEC_EXECUTION.NBIN", "NEWSTART_CGSL_NS-SA-2019-0044_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0070_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0076_KERNEL-RT.NASL", "OPENSUSE-2018-1331.NASL", "OPENSUSE-2018-1624.NASL", "OPENSUSE-2018-885.NASL", "OPENSUSE-2018-886.NASL", "OPENSUSE-2018-887.NASL", "OPENSUSE-2018-910.NASL", "OPENSUSE-2018-911.NASL", "OPENSUSE-2019-1046.NASL", "OPENSUSE-2019-618.NASL", "OPENSUSE-2019-622.NASL", "OPENSUSE-2019-631.NASL", "ORACLELINUX_ELSA-2018-2384.NASL", "ORACLELINUX_ELSA-2018-2390.NASL", "ORACLELINUX_ELSA-2018-4195.NASL", "ORACLELINUX_ELSA-2018-4196.NASL", "ORACLELINUX_ELSA-2018-4210.NASL", "ORACLELINUX_ELSA-2018-4214.NASL", "ORACLELINUX_ELSA-2018-4215.NASL", "ORACLELINUX_ELSA-2018-4242.NASL", "ORACLELINUX_ELSA-2018-4245.NASL", "ORACLEVM_OVMSA-2018-0246.NASL", "ORACLEVM_OVMSA-2018-0247.NASL", "ORACLEVM_OVMSA-2018-0248.NASL", "ORACLEVM_OVMSA-2018-0251.NASL", "ORACLEVM_OVMSA-2018-0254.NASL", "ORACLEVM_OVMSA-2018-0271.NASL", "ORACLEVM_OVMSA-2018-0272.NASL", "ORACLEVM_OVMSA-2018-0282.NASL", "ORACLEVM_OVMSA-2020-0039.NASL", "PFSENSE_SA-18_08.NASL", "PHOTONOS_PHSA-2018-1_0-0180.NASL", "PHOTONOS_PHSA-2018-1_0-0180_LINUX.NASL", "PHOTONOS_PHSA-2018-2_0-0088.NASL", "PHOTONOS_PHSA-2018-2_0-0088_LINUX.NASL", "RANCHEROS_1_4_1.NASL", "REDHAT-RHSA-2018-2384.NASL", "REDHAT-RHSA-2018-2387.NASL", "REDHAT-RHSA-2018-2388.NASL", "REDHAT-RHSA-2018-2389.NASL", "REDHAT-RHSA-2018-2390.NASL", "REDHAT-RHSA-2018-2391.NASL", "REDHAT-RHSA-2018-2392.NASL", "REDHAT-RHSA-2018-2393.NASL", "REDHAT-RHSA-2018-2394.NASL", "REDHAT-RHSA-2018-2395.NASL", "REDHAT-RHSA-2018-2396.NASL", "REDHAT-RHSA-2018-2402.NASL", "REDHAT-RHSA-2018-2403.NASL", "REDHAT-RHSA-2018-2404.NASL", "SLACKWARE_SSA_2018-240-01.NASL", "SL_20180814_KERNEL_ON_SL6_X.NASL", "SL_20180814_KERNEL_ON_SL7_X.NASL", "SMB_NT_MS18_AUG_4343885.NASL", "SMB_NT_MS18_AUG_4343887.NASL", "SMB_NT_MS18_AUG_4343892.NASL", "SMB_NT_MS18_AUG_4343897.NASL", "SMB_NT_MS18_AUG_4343898.NASL", "SMB_NT_MS18_AUG_4343900.NASL", "SMB_NT_MS18_AUG_4343901.NASL", "SMB_NT_MS18_AUG_4343909.NASL", "SMB_NT_MS18_AUG_DOTNET.NASL", "SMB_NT_MS18_AUG_INTERNET_EXPLORER.NASL", "SMB_NT_MS18_AUG_MICROCODE.NASL", "SMB_NT_MS18_AUG_WIN2008.NASL", "SMB_NT_MS19_FEB_OOB_MICROCODE.NASL", "SMB_NT_MS19_MAR_OOB_MICROCODE.NASL", "SOLARIS_JAN2019_SRU11_4_3_5_0.NASL", "SUSE_SU-2018-2328-1.NASL", "SUSE_SU-2018-2331-1.NASL", "SUSE_SU-2018-2331-2.NASL", "SUSE_SU-2018-2332-1.NASL", "SUSE_SU-2018-2335-1.NASL", "SUSE_SU-2018-2338-1.NASL", "SUSE_SU-2018-2341-1.NASL", "SUSE_SU-2018-2342-1.NASL", "SUSE_SU-2018-2344-1.NASL", "SUSE_SU-2018-2344-2.NASL", "SUSE_SU-2018-2345-1.NASL", "SUSE_SU-2018-2346-1.NASL", "SUSE_SU-2018-2347-1.NASL", "SUSE_SU-2018-2348-1.NASL", "SUSE_SU-2018-2349-1.NASL", "SUSE_SU-2018-2350-1.NASL", "SUSE_SU-2018-2351-1.NASL", "SUSE_SU-2018-2352-1.NASL", "SUSE_SU-2018-2353-1.NASL", "SUSE_SU-2018-2354-1.NASL", "SUSE_SU-2018-2355-1.NASL", "SUSE_SU-2018-2356-1.NASL", "SUSE_SU-2018-2358-1.NASL", "SUSE_SU-2018-2359-1.NASL", "SUSE_SU-2018-2362-1.NASL", "SUSE_SU-2018-2363-1.NASL", "SUSE_SU-2018-2364-1.NASL", "SUSE_SU-2018-2366-1.NASL", "SUSE_SU-2018-2367-1.NASL", "SUSE_SU-2018-2368-1.NASL", "SUSE_SU-2018-2369-1.NASL", "SUSE_SU-2018-2374-1.NASL", "SUSE_SU-2018-2380-1.NASL", "SUSE_SU-2018-2384-1.NASL", "SUSE_SU-2018-2387-1.NASL", "SUSE_SU-2018-2389-1.NASL", "SUSE_SU-2018-2391-1.NASL", "SUSE_SU-2018-2401-1.NASL", "SUSE_SU-2018-2409-1.NASL", "SUSE_SU-2018-2410-1.NASL", "SUSE_SU-2018-2410-2.NASL", "SUSE_SU-2018-2416-1.NASL", "SUSE_SU-2018-2480-1.NASL", "SUSE_SU-2018-2482-1.NASL", "SUSE_SU-2018-2483-1.NASL", "SUSE_SU-2018-2528-1.NASL", "SUSE_SU-2018-3490-1.NASL", "SUSE_SU-2018-4300-1.NASL", "UBUNTU_USN-3740-1.NASL", "UBUNTU_USN-3740-2.NASL", "UBUNTU_USN-3741-1.NASL", "UBUNTU_USN-3741-2.NASL", "UBUNTU_USN-3741-3.NASL", "UBUNTU_USN-3742-1.NASL", "UBUNTU_USN-3756-1.NASL", "VIRTUOZZO_VZA-2018-055.NASL", "VIRTUOZZO_VZA-2018-063.NASL", "VMWARE_ESXI_VMSA-2018-0020.NASL", "VMWARE_VCENTER_VMSA-2018-0020.NASL", "VMWARE_VCENTER_VMSA-2018-0021.NASL", "VMWARE_VSPHERE_DATA_PROTECTION_VMSA-2018-0021.NASL", "VMWARE_VSPHERE_VREALIZE_AUTOMATION_VMSA-2018-0021.NASL", "VMWARE_WORKSTATION_LINUX_VMSA_2018_0020.NASL", "VMWARE_WORKSTATION_WIN_VMSA_2018_0020.NASL", "XEN_SERVER_XSA-273.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310107834", "OPENVAS:1361412562310108766", "OPENVAS:1361412562310108767", "OPENVAS:1361412562310704274", "OPENVAS:1361412562310704279", "OPENVAS:1361412562310813759", "OPENVAS:1361412562310813760", "OPENVAS:1361412562310813763", "OPENVAS:1361412562310813766", "OPENVAS:1361412562310813840", "OPENVAS:1361412562310813841", "OPENVAS:1361412562310813842", "OPENVAS:1361412562310813843", "OPENVAS:1361412562310813844", "OPENVAS:1361412562310813845", "OPENVAS:1361412562310813846", "OPENVAS:1361412562310814426", "OPENVAS:1361412562310843612", "OPENVAS:1361412562310843613", "OPENVAS:1361412562310843614", "OPENVAS:1361412562310843616", "OPENVAS:1361412562310843617", "OPENVAS:1361412562310843620", "OPENVAS:1361412562310843629", "OPENVAS:1361412562310851858", "OPENVAS:1361412562310851863", "OPENVAS:1361412562310851864", "OPENVAS:1361412562310851952", "OPENVAS:1361412562310851992", "OPENVAS:1361412562310852221", "OPENVAS:1361412562310874959", "OPENVAS:1361412562310874963", "OPENVAS:1361412562310874964", "OPENVAS:1361412562310874965", "OPENVAS:1361412562310874998", "OPENVAS:1361412562310875005", "OPENVAS:1361412562310875010", "OPENVAS:1361412562310875025", "OPENVAS:1361412562310875066", "OPENVAS:1361412562310875092", "OPENVAS:1361412562310875099", "OPENVAS:1361412562310875128", "OPENVAS:1361412562310875131", "OPENVAS:1361412562310875162", "OPENVAS:1361412562310875170", "OPENVAS:1361412562310875189", "OPENVAS:1361412562310875201", "OPENVAS:1361412562310875247", "OPENVAS:1361412562310875255", "OPENVAS:1361412562310875287", "OPENVAS:1361412562310875303", "OPENVAS:1361412562310875330", "OPENVAS:1361412562310875334", "OPENVAS:1361412562310875349", "OPENVAS:1361412562310875369", "OPENVAS:1361412562310875407", "OPENVAS:1361412562310875414", "OPENVAS:1361412562310875423", "OPENVAS:1361412562310875438", "OPENVAS:1361412562310875443", "OPENVAS:1361412562310875459", "OPENVAS:1361412562310875476", "OPENVAS:1361412562310875506", "OPENVAS:1361412562310875528", "OPENVAS:1361412562310875559", "OPENVAS:1361412562310875566", "OPENVAS:1361412562310875577", "OPENVAS:1361412562310876322", "OPENVAS:1361412562310876377", "OPENVAS:1361412562310882935", "OPENVAS:1361412562310882936", "OPENVAS:1361412562310891481", "OPENVAS:1361412562310891506", "OPENVAS:1361412562311220181278", "OPENVAS:1361412562311220181279", "OPENVAS:1361412562311220181323", "OPENVAS:1361412562311220181345", "OPENVAS:1361412562311220181350", "OPENVAS:1361412562311220191515"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2019", "ORACLE:CPUJAN2019", "ORACLE:CPUJUL2020"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-2384", "ELSA-2018-2390", "ELSA-2018-2748", "ELSA-2018-2846", "ELSA-2018-4195", "ELSA-2018-4196", "ELSA-2018-4210", "ELSA-2018-4214", "ELSA-2018-4215", "ELSA-2018-4235", "ELSA-2018-4242", "ELSA-2018-4245", "ELSA-2019-4702", "ELSA-2019-4732"]}, {"type": "osv", "idList": ["OSV:DLA-1481-1", "OSV:DLA-1529-1", "OSV:DSA-4274-1", "OSV:DSA-4279-1"]}, {"type": "paloalto", "idList": ["PAN-SA-2018-0011"]}, {"type": "photon", "idList": ["PHSA-2018-0088", "PHSA-2018-0180", "PHSA-2018-1.0-0180", "PHSA-2018-2.0-0088", "PHSA-2019-0236", "PHSA-2019-1.0-0236"]}, {"type": "redhat", "idList": ["RHSA-2018:2384", "RHSA-2018:2387", "RHSA-2018:2388", "RHSA-2018:2389", "RHSA-2018:2390", "RHSA-2018:2391", "RHSA-2018:2392", "RHSA-2018:2393", "RHSA-2018:2394", "RHSA-2018:2395", "RHSA-2018:2396", "RHSA-2018:2402", "RHSA-2018:2403", "RHSA-2018:2404", "RHSA-2018:2602", "RHSA-2018:2603"]}, {"type": "redhatcve", "idList": ["RH:CVE-2018-3620", "RH:CVE-2018-3646"]}, {"type": "slackware", "idList": ["SSA-2018-240-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:2399-1", "OPENSUSE-SU-2018:2404-1", "OPENSUSE-SU-2018:2407-1", "OPENSUSE-SU-2018:2434-1", "OPENSUSE-SU-2018:2436-1", "OPENSUSE-SU-2018:4304-1"]}, {"type": "symantec", "idList": ["SMNTC-105007", "SMNTC-105039"]}, {"type": "talosblog", "idList": ["TALOSBLOG:A9E55A97439608C62C1BF62669B8074A"]}, {"type": "thn", "idList": ["THN:EF99982C6EC60931564882E926297F08"]}, {"type": "threatpost", "idList": ["THREATPOST:961233DDAF80602C2DDEC2B819294F05", "THREATPOST:E454192F36C2E44BAE14AB9B62BE28DB", "THREATPOST:E64CAEDE2A084CD5957FD00ADB336D68"]}, {"type": "ubuntu", "idList": ["USN-3740-1", "USN-3740-2", "USN-3741-1", "USN-3741-2", "USN-3741-3", "USN-3742-1", "USN-3742-2", "USN-3742-3", "USN-3756-1", "USN-3823-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-3620", "UB:CVE-2018-3646"]}, {"type": "virtuozzo", "idList": ["VZA-2018-054", "VZA-2018-055", "VZA-2018-063"]}, {"type": "vmware", "idList": ["VMSA-2018-0020", "VMSA-2018-0021", "VMSA-2018-0021.2"]}, {"type": "xen", "idList": ["XSA-273", "XSA-289"]}]}, "score": {"value": 0.1, "vector": "NONE"}, "backreferences": {"references": [{"type": "amazon", "idList": ["ALAS-2018-1058"]}, {"type": "apple", "idList": ["APPLE:395E729CF93F555C415D358DB1C43E9A", "APPLE:HT209193"]}, {"type": "attackerkb", "idList": ["AKB:D2380257-7D97-4A85-961C-A25C70361E50"]}, {"type": "centos", "idList": ["CESA-2018:2384", "CESA-2018:2390"]}, {"type": "cert", "idList": ["VU:982149"]}, {"type": "cisco", "idList": ["CISCO-SA-20180814-CPUSIDECHANNEL"]}, {"type": "citrix", "idList": ["CTX236548"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:B6F9117DDC7188793F0CD8F25AB1B9C7"]}, {"type": "cve", "idList": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8200", "CVE-2018-8360", "CVE-2018-8385"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1481-1:EB6C9", "DEBIAN:DLA-1506-1:B3A8C", "DEBIAN:DSA-4274-1:19FA6", "DEBIAN:DSA-4279-1:66DD9"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-3620", "DEBIANCVE:CVE-2018-3646"]}, {"type": "f5", "idList": ["F5:K31300402", "F5:K70675920", "F5:K95275140"]}, {"type": "fedora", "idList": ["FEDORA:122AE604D3F9", "FEDORA:1EFAB60ACFB0", "FEDORA:2429C641CB6F", "FEDORA:250CB6087A80", "FEDORA:29049600CFF3", "FEDORA:2C89F6167407", "FEDORA:3266960F0E44", "FEDORA:37B8362B00D0", "FEDORA:41B546014626", "FEDORA:42DA3601FD86", "FEDORA:445816021736", "FEDORA:4D5AD601FDAC", "FEDORA:50E6E6087656", "FEDORA:5267F604C2BD", "FEDORA:5D742610B071", "FEDORA:6B39A60C690C", "FEDORA:6B66A6047312", "FEDORA:728DA604CD72", "FEDORA:7640C641CB61", "FEDORA:87BD56087904", "FEDORA:8F974604E846", "FEDORA:95A686085F81", "FEDORA:9E3D9606D195", "FEDORA:AC7FC600CFCA", "FEDORA:B395E6087A9D", "FEDORA:BBFE360460D0", "FEDORA:BD35260BC96F", "FEDORA:C49D061F375F", "FEDORA:C64AE6007F37", "FEDORA:C65F560874BD", "FEDORA:D5F726042B1F", "FEDORA:D6CAE607A456", "FEDORA:D6F86601E6D9", "FEDORA:E5291607602A", "FEDORA:E93AE6077DCD", "FEDORA:EBB026048D2E"]}, {"type": "fortinet", "idList": ["FG-IR-18-002"]}, {"type": "freebsd", "idList": ["2310B814-A652-11E8-805B-A4BADB2F4699"]}, {"type": "gentoo", "idList": ["GLSA-201810-06"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20180815-01-CPU"]}, {"type": "ibm", "idList": ["78BAD43C88F0291540D28D9B278D560FB7D643B21400003DDCF10124DD2DED21"]}, {"type": "kaspersky", "idList": ["KLA11304", "KLA11305", "KLA11306", "KLA11309"]}, {"type": "lenovo", "idList": ["LENOVO:PS500179-NOSID"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/FREEBSD-CVE-2018-3620/", "MSF:ILITIES/FREEBSD-CVE-2018-3646/"]}, {"type": "mscve", "idList": ["MS:ADV180018", "MS:CVE-2018-8200", "MS:CVE-2018-8360", "MS:CVE-2018-8385"]}, {"type": "mskb", "idList": ["KB4343888", "KB4343896", "KB4343897", "KB4345593", "KB4345680", "KB4457984"]}, {"type": "nessus", "idList": ["AL2_ALAS-2018-1058.NASL", "ALA_ALAS-2018-1058.NASL", "CENTOS_RHSA-2018-2384.NASL", "CENTOS_RHSA-2018-2390.NASL", "CITRIX_XENSERVER_CTX236548.NASL", "DEBIAN_DLA-1481.NASL", "DEBIAN_DSA-4274.NASL", "DEBIAN_DSA-4279.NASL", "FEDORA_2018-1C80FEA1CD.NASL", "FREEBSD_PKG_2310B814A65211E8805BA4BADB2F4699.NASL", "GENTOO_GLSA-201810-06.NASL", "MACOSX_SECUPD2018-005.NASL", "MACOSX_SECUPD_10_13_6_2018-002.NASL", "MICROSOFT_OFFICE_UNSUPPORTED.NASL", "OPENSUSE-2018-1331.NASL", "OPENSUSE-2018-885.NASL", "OPENSUSE-2018-886.NASL", "OPENSUSE-2018-887.NASL", "OPENSUSE-2018-910.NASL", "OPENSUSE-2018-911.NASL", "OPENSUSE-2019-1046.NASL", "OPENSUSE-2019-618.NASL", "OPENSUSE-2019-622.NASL", "OPENSUSE-2019-631.NASL", "ORACLELINUX_ELSA-2018-2384.NASL", "ORACLELINUX_ELSA-2018-2390.NASL", "ORACLELINUX_ELSA-2018-4195.NASL", "ORACLELINUX_ELSA-2018-4196.NASL", "ORACLELINUX_ELSA-2018-4242.NASL", "ORACLELINUX_ELSA-2018-4245.NASL", "ORACLEVM_OVMSA-2018-0246.NASL", "ORACLEVM_OVMSA-2018-0247.NASL", "ORACLEVM_OVMSA-2018-0251.NASL", "PHOTONOS_PHSA-2018-1_0-0180_LINUX.NASL", "PHOTONOS_PHSA-2018-2_0-0088_LINUX.NASL", "REDHAT-RHSA-2018-2384.NASL", "REDHAT-RHSA-2018-2387.NASL", "REDHAT-RHSA-2018-2388.NASL", "REDHAT-RHSA-2018-2389.NASL", "REDHAT-RHSA-2018-2390.NASL", "REDHAT-RHSA-2018-2391.NASL", "REDHAT-RHSA-2018-2392.NASL", "REDHAT-RHSA-2018-2393.NASL", "REDHAT-RHSA-2018-2394.NASL", "REDHAT-RHSA-2018-2395.NASL", "REDHAT-RHSA-2018-2396.NASL", "REDHAT-RHSA-2018-2402.NASL", "REDHAT-RHSA-2018-2403.NASL", "REDHAT-RHSA-2018-2404.NASL", "SLACKWARE_SSA_2018-240-01.NASL", "SL_20180814_KERNEL_ON_SL6_X.NASL", "SL_20180814_KERNEL_ON_SL7_X.NASL", "SOLARIS_JAN2019_SRU11_4_3_5_0.NASL", "SUSE_SU-2018-2328-1.NASL", "SUSE_SU-2018-2331-1.NASL", "SUSE_SU-2018-2332-1.NASL", "SUSE_SU-2018-2335-1.NASL", "SUSE_SU-2018-2341-1.NASL", "SUSE_SU-2018-2342-1.NASL", "SUSE_SU-2018-2344-1.NASL", "SUSE_SU-2018-2345-1.NASL", "SUSE_SU-2018-2346-1.NASL", "SUSE_SU-2018-2347-1.NASL", "SUSE_SU-2018-2348-1.NASL", "SUSE_SU-2018-2349-1.NASL", "SUSE_SU-2018-2350-1.NASL", "SUSE_SU-2018-2351-1.NASL", "SUSE_SU-2018-2352-1.NASL", "SUSE_SU-2018-2353-1.NASL", "SUSE_SU-2018-2354-1.NASL", "SUSE_SU-2018-2355-1.NASL", "SUSE_SU-2018-2356-1.NASL", "SUSE_SU-2018-2358-1.NASL", "SUSE_SU-2018-2359-1.NASL", "SUSE_SU-2018-2362-1.NASL", "SUSE_SU-2018-2363-1.NASL", "SUSE_SU-2018-2364-1.NASL", "SUSE_SU-2018-2366-1.NASL", "SUSE_SU-2018-2367-1.NASL", "SUSE_SU-2018-2368-1.NASL", "SUSE_SU-2018-2369-1.NASL", "SUSE_SU-2018-2374-1.NASL", "SUSE_SU-2018-2384-1.NASL", "SUSE_SU-2018-2387-1.NASL", "SUSE_SU-2018-2389-1.NASL", "SUSE_SU-2018-2391-1.NASL", "SUSE_SU-2018-2401-1.NASL", "SUSE_SU-2018-2410-1.NASL", "SUSE_SU-2018-2416-1.NASL", "SUSE_SU-2018-2480-1.NASL", "SUSE_SU-2018-2482-1.NASL", "SUSE_SU-2018-2483-1.NASL", "SUSE_SU-2018-2528-1.NASL", "SUSE_SU-2018-3490-1.NASL", "UBUNTU_USN-3740-1.NASL", "UBUNTU_USN-3740-2.NASL", "UBUNTU_USN-3741-1.NASL", "UBUNTU_USN-3741-2.NASL", "UBUNTU_USN-3741-3.NASL", "UBUNTU_USN-3742-1.NASL", "UBUNTU_USN-3756-1.NASL", "VIRTUOZZO_VZA-2018-055.NASL", "VMWARE_ESXI_VMSA-2018-0020.NASL", "VMWARE_VCENTER_VMSA-2018-0020.NASL", "VMWARE_WORKSTATION_LINUX_VMSA_2018_0020.NASL", "XEN_SERVER_XSA-273.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704274", "OPENVAS:1361412562310704279", "OPENVAS:1361412562310813759", "OPENVAS:1361412562310813760", "OPENVAS:1361412562310813763", "OPENVAS:1361412562310813766", "OPENVAS:1361412562310813840", "OPENVAS:1361412562310813841", "OPENVAS:1361412562310813842", "OPENVAS:1361412562310813843", "OPENVAS:1361412562310813844", "OPENVAS:1361412562310813845", "OPENVAS:1361412562310813846", "OPENVAS:1361412562310814426", "OPENVAS:1361412562310843612", "OPENVAS:1361412562310843613", "OPENVAS:1361412562310843614", "OPENVAS:1361412562310843616", "OPENVAS:1361412562310843617", "OPENVAS:1361412562310843620", "OPENVAS:1361412562310851858", "OPENVAS:1361412562310851863", "OPENVAS:1361412562310851864", "OPENVAS:1361412562310851952", "OPENVAS:1361412562310851992", "OPENVAS:1361412562310874959", "OPENVAS:1361412562310874963", "OPENVAS:1361412562310874964", "OPENVAS:1361412562310874965", "OPENVAS:1361412562310874998", "OPENVAS:1361412562310875005", "OPENVAS:1361412562310875099", "OPENVAS:1361412562310875407", "OPENVAS:1361412562310875414", "OPENVAS:1361412562310875423", "OPENVAS:1361412562310875438", "OPENVAS:1361412562310875443", "OPENVAS:1361412562310882935", "OPENVAS:1361412562310882936"]}, {"type": "oracle", "idList": ["ORACLE:CPUJUL2020"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-2384", "ELSA-2018-2390", "ELSA-2018-2748", "ELSA-2018-2846", "ELSA-2018-4195", "ELSA-2018-4196", "ELSA-2018-4242", "ELSA-2018-4245"]}, {"type": "paloalto", "idList": ["PAN-SA-2018-0011"]}, {"type": "photon", "idList": ["PHSA-2018-1.0-0180", "PHSA-2018-2.0-0088", "PHSA-2019-1.0-0236"]}, {"type": "redhat", "idList": ["RHSA-2018:2388", "RHSA-2018:2389", "RHSA-2018:2390", "RHSA-2018:2392", "RHSA-2018:2402", "RHSA-2018:2403", "RHSA-2018:2404"]}, {"type": "slackware", "idList": ["SSA-2018-240-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:2399-1", "OPENSUSE-SU-2018:2404-1", "OPENSUSE-SU-2018:2407-1", "OPENSUSE-SU-2018:2434-1", "OPENSUSE-SU-2018:2436-1"]}, {"type": "talosblog", "idList": ["TALOSBLOG:A9E55A97439608C62C1BF62669B8074A"]}, {"type": "thn", "idList": ["THN:EF99982C6EC60931564882E926297F08"]}, {"type": "threatpost", "idList": ["THREATPOST:961233DDAF80602C2DDEC2B819294F05", "THREATPOST:E454192F36C2E44BAE14AB9B62BE28DB", "THREATPOST:E64CAEDE2A084CD5957FD00ADB336D68"]}, {"type": "ubuntu", "idList": ["USN-3740-1", "USN-3740-2", "USN-3741-1", "USN-3741-2", "USN-3741-3", "USN-3742-1", "USN-3742-2", "USN-3742-3"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-3620", "UB:CVE-2018-3646"]}, {"type": "virtuozzo", "idList": ["VZA-2018-054", "VZA-2018-055", "VZA-2018-063"]}, {"type": "vmware", "idList": ["VMSA-2018-0021.2"]}, {"type": "xen", "idList": ["XSA-273"]}]}, "exploitation": null, "vulnersScore": 0.1}, "_state": {"dependencies": 1673433670, "score": 1673433928}, "_internal": {"score_hash": "7286f1ef43505c28a8e70aca1c110e82"}, "kb": "KB4343892", "msrc": "", "mscve": "CVE-2018-8385", "msplatform": "Windows 10 for x64-based Systems", "msfamily": "Browser", "msimpact": "Remote Code Execution", "msseverity": "Critical", "superseeds": ["KB4093111", "KB4038781", "KB4088786", "KB4103716", "KB4034668", "KB4012606", "KB4284860", "KB4042895", "KB4015221", "KB4056893", "KB4022727", "KB4053581", "KB4048956", "KB4074596", "KB4019474", "KB4025338", "KB4338829", "KB3210720"], "parentseeds": ["KB5004950", "KB4512497", "KB5014710", "KB4483228", "KB5010358", "KB4503291", "KB5017327", "KB4561649", "KB4507458", "KB4520011", "KB4550930", "KB4471323", "KB4499154", "KB5012653", "KB5009585", "KB4571692", "KB5007207", "KB4467680", "KB5019970", "KB5001340", "KB4516070", "KB5011491", "KB4457132", "KB4493475", "KB4580327", "KB4530681", "KB5013963", "KB5003687", "KB4524153", "KB5021243", "KB4598231", "KB5015832", "KB4487018", "KB4480962", "KB5008230", "KB4534306", "KB4489872", "KB5004249", "KB5022297", "KB4601331", "KB5005569", "KB5003172", "KB5005040", "KB4565513", "KB5018425", "KB4537776", "KB4462922", "KB5000807", "KB4525232", "KB4586787", "KB5016639", "KB5006675", "KB4577049", "KB4556826", "KB4540693", "KB4592464"], "msproducts": ["10735", "10486", "10724", "2472", "10729", "11518"], "affectedProducts": ["Microsoft .NET Framework 3.5", "Windows 10 for 32-bit Systems", "Microsoft Edge (EdgeHTML-based)", "Microsoft .NET Framework 4.6/4.6.1/4.6.2", "Windows 10 for x64-based Systems", "Internet Explorer 11"], "supportAreaPaths": [], "supportAreaPathNodes": [], "primarySupportAreaPath": []}
{"mskb": [{"lastseen": "2022-08-24T11:13:53", "description": "None\n**Note** This release also contains updates for Windows 10 Mobile (OS Build 15063.1266) released August 14, 2018.\n\n## Improvements and fixes\n\nThis update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) guidance KB article. (_These registry settings are enabled by default for Windows Client OS editions._)\n * Addresses an issue that causes Internet Explorer to stop working for certain websites.\n * Updates support for the draft version of the Token Binding protocol v0.16.\n * Addresses an issue that causes Device Guard to block some **ieframe.dll** class IDs after installing the May 2018 Cumulative Update.\n * Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.\n * Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) _and_ a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is \u201cThis module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement\u201d. For more information, see [https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200](<https://na01.safelinks.protection.outlook.com/?url=https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=kSZ7s7nk9hHky/03rwqdcaoAMJdwJwd%2BsltaI4ODW/s%3D&reserved=0>) and [https://aka.ms/PSModuleFunctionExport](<https://na01.safelinks.protection.outlook.com/?url=https://aka.ms/PSModuleFunctionExport&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=muUIr/qbRp8/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&reserved=0>).\n * Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \u201caccess denied,\u201d \u201cclass not registered,\u201d or \u201cinternal failure occurred for unknown reasons\u201d errors.\n * Addresses a vulnerability issue by correcting the way that the .NET Framework handles high-load or high-density network connections. For more information, see [CVE-2018-8360](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fsecurity-guidance%2Fadvisory%2FCVE-2018-8360&data=02%7C01%7C%7C111dc7208a70414e6bee08d602d7ad2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636699522675716939&sdata=LgAttISSbu40x0et1EFqQUqJAPTJGmmqTdB6foyZAZ8%3D&reserved=0>).\n * Security updates to Windows Server.\nIf you installed earlier updates, only the new fixes in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 Feature Update based on device compatibility and Windows Update for Business deferral policy. This does not apply to long-term servicing editions.\n\n## Known issues in this update\n\nMicrosoft is not currently aware of any issues with this update.\n\n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343885>) website.**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4343885](<http://download.microsoft.com/download/A/B/3/AB3657EE-8C78-46B7-B1F6-ECCC34E5F627/4343885.csv>).\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343885 (OS Build 15063.1266)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8200", "CVE-2018-8360", "CVE-2018-8385"], "modified": "2018-08-14T07:00:00", "id": "KB4343885", "href": "https://support.microsoft.com/en-us/help/4343885", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-08-24T11:13:58", "description": "None\n**Note **This release also contains updates for Microsoft HoloLens (OS Build 17134.228) released August 14, 2018.\n\n## Improvements and fixes\n\nThis update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/security-guidance/advisory/ADV180018>) and [CVE-2018-3646)](<https://portal.msrc.microsoft.com/security-guidance/advisory/ADV180018>). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the Windows Client and Windows Server guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)_\n * Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 ([CVE-2017-5715](<https://portal.msrc.microsoft.com/security-guidance/advisory/ADV180002>) \u2013 Branch Target Injection).\n * Addresses an issue that prevents apps from receiving mesh updates after resuming. This issue occurs for apps that use Spatial Mapping mesh data and participate in the Sleep or Resume cycle.\n * Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.\n * Addresses an issue that prevents some applications running on HoloLens, such as Remote Assistance, from authenticating after upgrading from Windows 10, version 1607, to Windows 10, version 1803.\n * Addresses an issue that significantly reduced battery life after upgrading to Windows 10, version 1803.\n * Addresses an issue that causes Device Guard to block some **ieframe.dll** class IDs after installing the May 2018 Cumulative Update.\n * Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) _and_ a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is \u201cThis module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement.\u201d For more information, see <https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8200> and <https://aka.ms/PSModuleFunctionExport>.\n * Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \u201caccess denied,\u201d \u201cclass not registered,\u201d or \u201cinternal failure occurred for unknown reasons\u201d errors.\n * Addresses a vulnerability issue by correcting the way that the .NET Framework handles high-load or high-density network connections. For more information, see [CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).\n * Security updates to Windows Server.\nIf you installed earlier updates, only the new fixes in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nSymptom| Workaround \n---|--- \nLaunching Microsoft Edge using the **New Application Guard****Window** may fail; normal Microsoft Edge instances are not affected.| This issue is resolved in KB4346783. \nAfter installing this update, Windows no longer recognizes the Personal Information exchange (PFX) certificate that\u2019s used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn\u2019t recognize that the required certificate is on the device.| This issue is resolved in KB4464218. \n \n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343909>) website.**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4343909](<http://download.microsoft.com/download/7/D/7/7D711C08-831D-40A0-A8CA-50156D5CED24/4343909.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343909 (OS Build 17134.228)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5715", "CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8200", "CVE-2018-8360", "CVE-2018-8385"], "modified": "2018-08-14T07:00:00", "id": "KB4343909", "href": "https://support.microsoft.com/en-us/help/4343909", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-08-24T11:13:56", "description": "None\n## Improvements and fixes\n\nThis update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) and [Windows Server](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&reserved=0>) guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions._)\n * Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 ([CVE-2017-5715](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002>) \u2013 Branch Target Injection).\n * Updates support for the draft version of the Token Binding protocol v0.16.\n * Addresses an issue that causes Device Guard to block some **ieframe.dll** class IDs after the May 2018 Cumulative Update is installed.\n * Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.\n * Addresses an issue that displays \u201cAzureAD\u201d as the default domain on the sign-in screen after installing the July 24, 2018 update on a Hybrid Azure AD-joined machine. As a result, users may fail to sign in in Hybrid Azure AD-joined scenarios when users provide only their username and password.\n * Addresses an issue that adds additional spaces to content that's copied from Internet Explorer to other apps.\n * Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) _and_ a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is \u201cThis module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement\u201d. For more information, see [https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200](<https://na01.safelinks.protection.outlook.com/?url=https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=kSZ7s7nk9hHky/03rwqdcaoAMJdwJwd%2BsltaI4ODW/s%3D&reserved=0>) and [https://aka.ms/PSModuleFunctionExport](<https://na01.safelinks.protection.outlook.com/?url=https://aka.ms/PSModuleFunctionExport&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=muUIr/qbRp8/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&reserved=0>) .\n * Addresses an issue that was introduced in the July 2018 .NET Framework update. Applications that rely on COM components were failing to load or run correctly because of \u201caccess denied,\u201d \u201cclass not registered,\u201d or \u201cinternal failure occurred for unknown reasons\u201d errors.\n * Addresses a vulnerability issue by correcting the way that the .NET Framework handles high-load or high-density network connections. For more information, see [CVE-2018-8360](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fsecurity-guidance%2Fadvisory%2FCVE-2018-8360&data=02%7C01%7C%7C111dc7208a70414e6bee08d602d7ad2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636699522675716939&sdata=LgAttISSbu40x0et1EFqQUqJAPTJGmmqTdB6foyZAZ8%3D&reserved=0>).\n * Security updates to Windows Server.\nIf you installed earlier updates, only the new fixes in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nSymptom| Workaround \n---|--- \nSome non-English platforms may display the following string in English instead of the localized language: \u201dReading scheduled jobs from file is not supported in this language mode.\u201d This error appears when you try to read the scheduled jobs you've created and Device Guard is enabled| After evaluation, Microsoft has determined that this is a low probability and a low-risk issue, and we will not provide a solution at this time for Windows 10, version 1709. If you believe that you are affected by this issue, please contact [Microsoft Support](<https://support.microsoft.com/en-us/gp/contactus81?forceorigin=esmc&Audience=Commercial>). \nWhen Device Guard is enabled, some non-English platforms may display the following strings in English instead of the localized language:\n\n * \"Cannot use '&' or '.' operators to invoke a module scope command across language boundaries.\"\n * \"'Script' resource from 'PSDesiredStateConfiguration' module is not supported when Device Guard is enabled. Please use 'Script' resource published by PSDscResources module from PowerShell Gallery.\"\n| After evaluation, Microsoft has determined that this is a low probability and a low-risk issue, and we will not provide a solution at this time for Windows 10, version 1709. If you believe that you are affected by this issue, please contact [Microsoft Support](<https://support.microsoft.com/en-us/gp/contactus81?forceorigin=esmc&Audience=Commercial>). \nAfter installing this update, Windows no longer recognizes the Personal Information exchange (PFX) certificate that\u2019s used for authenticating to a Wi-Fi or VPN connection. As a result, Microsoft Intune takes a long time to deliver user profiles because it doesn\u2019t recognize that the required certificate is on the device.| This issue is resolved in KB4464217. \n \n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343897 >) website.**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4343897](<http://download.microsoft.com/download/D/3/7/D3797C34-3187-4C5B-9CF1-CFD920BDFD69/4343897.csv>). \n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343897 (OS Build 16299.611)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5715", "CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8200", "CVE-2018-8360", "CVE-2018-8385"], "modified": "2018-08-14T07:00:00", "id": "KB4343897", "href": "https://support.microsoft.com/en-us/help/4343897", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T10:40:53", "description": "None\n**Note** This release also contains updates for Windows 10 Mobile (OS Build 14393.2431) released August 14, 2018.\n\n_Windows 10, version 1607, reached end of service on April 10, 2018. Devices running Windows 10 Home or Pro editions will no longer receive monthly security and quality updates that contain protection from the latest security threats. __To continue receiving security and quality updates, Microsoft recommends updating to the latest version of Windows 10._**IMPORTANT: **Windows 10 Enterprise and Windows 10 Education editions will receive six months of additional servicing at no cost. Devices on the Long-Term Servicing Channels (LTSC) will continue to receive updates until October 2026 per the [Lifecycle Policy page](<https://support.microsoft.com/en-us/lifecycle/search?alpha=Windows%2010>). Windows 10 Anniversary Update (v. 1607) devices running the Intel \u201cClovertrail\u201d chipset will continue to receive updates until January 2023 per the [Microsoft Community blog](<https://answers.microsoft.com/en-us/windows/forum/windows_10-windows_install/intel-clover-trail-processors-are-not-supported-on/ed1823d3-c82c-4d7f-ba9d-43ecbcf526e9?auth=1>).\n\n## Improvements and fixes\n\nThis update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) and [Windows Server](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&reserved=0>) guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)_\n * Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 ([CVE-2017-5715](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002>) \u2013 Branch Target Injection).\n * Addresses an issue that causes Internet Explorer to stop working for certain websites.\n * Addresses an issue that causes Device Guard to block some **ieframe.dll** class IDs after installing the May 2018 Cumulative Update.\n * Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.\n * Addresses a vulnerability related to the Export-Modulemember() function when used with a wildcard (*) _and_ a dot-sourcing script. After installing this update, existing modules on devices that have Device Guard enabled will intentionally fail. The exception error is \u201cThis module uses the dot-source operator while exporting functions using wildcard characters, and this is disallowed when the system is under application verification enforcement\u201d. For more information, see [https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200](<https://na01.safelinks.protection.outlook.com/?url=https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8200&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=kSZ7s7nk9hHky/03rwqdcaoAMJdwJwd%2BsltaI4ODW/s%3D&reserved=0>) and [https://aka.ms/PSModuleFunctionExport](<https://na01.safelinks.protection.outlook.com/?url=https://aka.ms/PSModuleFunctionExport&data=02%7c01%7c%7c8a6ab318938545f3ed6108d5fe1b548e%7c72f988bf86f141af91ab2d7cd011db47%7c1%7c0%7c636694315694526873&sdata=muUIr/qbRp8/%2B5fPfLzgY8OcpAEVxR3s9gS5bI6aFAg%3D&reserved=0>).\n * Addresses a vulnerability issue by correcting the way that the .NET Framework handles high-load or high-density network connections. For more information, see [CVE-2018-8360](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fsecurity-guidance%2Fadvisory%2FCVE-2018-8360&data=02%7C01%7C%7C111dc7208a70414e6bee08d602d7ad2f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636699522675716939&sdata=LgAttISSbu40x0et1EFqQUqJAPTJGmmqTdB6foyZAZ8%3D&reserved=0>).\n * Security updates to Windows Server.\n**Note **This update is not available with express installation files for Windows Server 2016.If you installed earlier updates, only the new fixes in this package will be downloaded and installed on your device.For more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n**Windows Update Improvements**Microsoft has released an update directly to the Windows Update client to improve reliability. Any device running Windows 10 configured to receive updates automatically from Windows Update, including Enterprise and Pro editions, will be offered the latest Windows 10 Feature Update based on device compatibility and Windows Update for Business deferral policy. This does not apply to long-term servicing editions.\n\n## Known issues in this update\n\nMicrosoft is not currently aware of any issues with this update.\n\n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343887>) website.**Prerequisite: **The servicing stack update (SSU) ([KB4132216](<https://support.microsoft.com/help/4132216/>)) must be installed _before_ installing the latest cumulative update (LCU) (KB4343887). The LCU will not be reported as applicable until the SSU is installed.**File information**For a list of the files that are provided in this update, download the [file information for cumulative update 4343887](<http://download.microsoft.com/download/2/9/A/29A00447-736F-4259-926E-650849687D10/4343887.csv>).\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343887 (OS Build 14393.2430)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5715", "CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8200", "CVE-2018-8360", "CVE-2018-8385"], "modified": "2018-08-14T07:00:00", "id": "KB4343887", "href": "https://support.microsoft.com/en-us/help/4343887", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T10:40:58", "description": "None\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update KB4338831 (released July 18, 2018) and addresses the following issues:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) and [Windows Server](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&reserved=0>) guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS Editions._)\n * Ensures that Internet Explorer and Microsoft Edge support the preload=\"none\" tag.\n * Addresses an issue that may prevent your device from starting up properly if you install KB3033055 (released September 2015) _after _installing any Monthly Rollup dated November 2017 or later.\nFor more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nSymptom| Workaround \n---|--- \nAfter installing this update, you may observe decreased performance in Internet Explorer 11 when roaming profiles are used or when the Microsoft Compatibility List is not used.| This issue is resolved in KB4463376. \n \n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343898>) website.**File information**For a list of the files that are provided in this update, download the [file information for update 4343898](<http://download.microsoft.com/download/A/1/5/A15ED788-11F3-44AA-BF82-8A2A260415C8/4343898.csv>). \n", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343898 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8385"], "modified": "2018-08-14T07:00:00", "id": "KB4343898", "href": "https://support.microsoft.com/en-us/help/4343898", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T10:41:02", "description": "None\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update KB4338816 (released July 18, 2018) and addresses the following issues:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Server](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&reserved=0>) guidance KB article. (_These registry settings are disabled by default for Windows Server OS editions._)\n * Provides protections against an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore ([CVE-2018-3665](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180016>)) for 32-Bit (x86) versions of Windows.\nFor more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nMicrosoft is not currently aware of any issues with this update.\n\n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343901>) website.**File information**For a list of the files that are provided in this update, download the [file information for update 4343901](<http://download.microsoft.com/download/8/1/A/81AE35A4-C38A-4441-AC26-38FEBC24D9C5/4343901.csv>).\n", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343901 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-3665", "CVE-2018-8385"], "modified": "2018-08-14T07:00:00", "id": "KB4343901", "href": "https://support.microsoft.com/en-us/help/4343901", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T10:41:02", "description": "None\n## Improvements and fixes\n\nThis security update includes improvements and fixes that were a part of update KB4338821 (released July 18, 2018) and addresses the following issues:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) and [Windows Server](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&reserved=0>) guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions.)_\n * Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 ([CVE-2017-5715](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002>) \u2013 Branch Target Injection).\n * Provides protections against an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore ([CVE-2018-3665](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180016>)) for 32-Bit (x86) versions of Windows.\nFor more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nSymptom| Workaround \n---|--- \nAfter you apply this update, the network interface controller may stop working on some client software configurations. This occurs because of an issue related to a missing file, oem<number>.inf. The exact problematic configurations are currently unknown.| \n\n 1. To locate the network device, launch devmgmt.msc; it may appear under **Other Devices**.\n 2. To automatically rediscover the NIC and install drivers, select **Scan for Hardware Changes** from the **Action **menu.\na. Alternatively, install the drivers for the network device by right-clicking the device and selecting **Update**. Then select **Search automatically for updated driver software** or **Browse my computer for driver software**. \nIn Internet Explorer 11, a blank page may appear for some redirects. Additionally, if you open a site that uses Active Directory Federation Services (AD FS) or Single sign-on (SSO), the site may be unresponsive.| This issue is resolved in KB4343894. \nAfter installing this update, you may observe decreased performance in Internet Explorer 11 when roaming profiles are used or when the Microsoft Compatibility List is not used.| This issue is resolved in KB4463376. \n \n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343900>) website.**File information**For a list of the files that are provided in this update, download the [file information for update 4343900](<http://download.microsoft.com/download/6/C/5/6C51D1F6-8B6F-4003-94B1-32E9C19AE3B5/4343900.csv>). \n", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343900 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5715", "CVE-2018-3620", "CVE-2018-3646", "CVE-2018-3665", "CVE-2018-8385"], "modified": "2018-08-14T07:00:00", "id": "KB4343900", "href": "https://support.microsoft.com/en-us/help/4343900", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-01-11T10:41:37", "description": "None\n## Improvements and fixes\n\nThis security update addresses the following issues:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fen-US%2Fsecurity-guidance%2Fadvisory%2FADV180018&data=02%7C01%7C%7Cc4df5fac79104bef5e8508d61444e0f6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636718683403717215&sdata=pGeSh%2FumqX3OZFmOC1u%2BGyFVD4szXTFrwpicoVYRvbY%3D&reserved=0>) and [CVE-2018-3646](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fen-US%2Fsecurity-guidance%2Fadvisory%2FADV180018&data=02%7C01%7C%7Cc4df5fac79104bef5e8508d61444e0f6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636718683403717215&sdata=pGeSh%2FumqX3OZFmOC1u%2BGyFVD4szXTFrwpicoVYRvbY%3D&reserved=0>)). Make sure that previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7Cc4df5fac79104bef5e8508d61444e0f6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636718683403717215&sdata=dWBDOZD%2FlzuukQZzmPs0ckiSuENLiGG8ZcM%2Ftfcs7sY%3D&reserved=0>) and [Windows Server](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7Cc4df5fac79104bef5e8508d61444e0f6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636718683403717215&sdata=a1b1KvYIQ0mrLgHL2cgZY%2F3IFrON02SS%2FhUSi8tFphU%3D&reserved=0>) guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions._).\n * Security updates Windows media, Windows Shell, Windows kernel, Windows datacenter networking, Windows virtualization and kernel, Microsoft JET Database Engine, Windows MSXML, and Windows Server.\nFor more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nSymptom| Workaround \n---|--- \nAll Guest Virtual Machines running Unicast NLB fail to respond to NLB requests after the Virtual Machines restart.| This issue is resolved in KB4463097. \n \n## How to get this update\n\nThis update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4458010>) website.**File information**For a list of files provided in this update, download the [file information for update 4458010](<http://download.microsoft.com/download/3/9/9/399879FE-FF16-48BA-B28C-B43D9313FD0B/4458010.csv>). \n", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-09-11T07:00:00", "type": "mskb", "title": "September 11, 2018\u2014KB4458010 (Monthly Rollup)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8447"], "modified": "2018-09-11T07:00:00", "id": "KB4458010", "href": "https://support.microsoft.com/en-us/help/4458010", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-08-24T11:13:54", "description": "None\n## Improvements and fixes\n\nThis security update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) and [Windows Server](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&reserved=0>) guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions._)\nFor more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nMicrosoft is not currently aware of any issues with this update.\n\n## How to get this update\n\nThis update is now available for installation through WSUS. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343888>) website.**File information**For a list of the files that are provided in this update, download the [file information for update 4343888](<http://download.microsoft.com/download/9/7/8/978BB3A6-F8E0-4B8F-8DA3-D6D931EF7384/4343888.csv>).\n", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343888 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8405"], "modified": "2018-08-14T07:00:00", "id": "KB4343888", "href": "https://support.microsoft.com/en-us/help/4343888", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-08-24T11:14:23", "description": "None\n## Improvements and fixes\n\nThis security update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fen-US%2Fsecurity-guidance%2Fadvisory%2FADV180018&data=02%7C01%7C%7Cc4df5fac79104bef5e8508d61444e0f6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636718683403717215&sdata=pGeSh%2FumqX3OZFmOC1u%2BGyFVD4szXTFrwpicoVYRvbY%3D&reserved=0>) and [CVE-2018-3646](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fportal.msrc.microsoft.com%2Fen-US%2Fsecurity-guidance%2Fadvisory%2FADV180018&data=02%7C01%7C%7Cc4df5fac79104bef5e8508d61444e0f6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636718683403717215&sdata=pGeSh%2FumqX3OZFmOC1u%2BGyFVD4szXTFrwpicoVYRvbY%3D&reserved=0>)). Make sure that previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7Cc4df5fac79104bef5e8508d61444e0f6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636718683403717215&sdata=dWBDOZD%2FlzuukQZzmPs0ckiSuENLiGG8ZcM%2Ftfcs7sY%3D&reserved=0>) and [Windows Server](<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7Cc4df5fac79104bef5e8508d61444e0f6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636718683403717215&sdata=a1b1KvYIQ0mrLgHL2cgZY%2F3IFrON02SS%2FhUSi8tFphU%3D&reserved=0>) guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions._).\n * Security updates Windows media, Windows Shell, Windows kernel, Windows datacenter networking, Windows virtualization and kernel, Microsoft JET Database Engine, Windows MSXML, and Windows Server.\nFor more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nSymptom| Workaround \n---|--- \nAll Guest Virtual Machines running Unicast NLB fail to respond to NLB requests after the Virtual Machines restart.| This issue is resolved in KB4463104. \n \n## How to get this update\n\nThis update is now available for installation through WSUS. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4457984>) website.**File information**For a list of files provided in this update, download the [file information for update 4457984](<http://download.microsoft.com/download/7/E/F/7EFB510B-341E-469B-A72B-909FB55D967B/4457984.csv>). \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-09-11T07:00:00", "type": "mskb", "title": "September 11, 2018\u2014KB4457984 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-8420"], "modified": "2018-09-11T07:00:00", "id": "KB4457984", "href": "https://support.microsoft.com/en-us/help/4457984", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:44:03", "description": "<html><body><p>Resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments.</p><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which\u00a0content from one stream can blend into another stream.</p><p>To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.</p><p>This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360\" id=\"kb-link-2\" target=\"\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8360</a>.</div><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see </span></span></span><a href=\"https://support.microsoft.com/en-us/help/4019990\"><span><span>KB 4019990</span></span></a><span><span><span>.</span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.</span></div><div>\u00a0</div><ul><li><span><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344152\" managed-link=\"\" target=\"_blank\">4344152</a> Description of the Security and Quality Rollup for .NET Framework 3.5.1 for Windows 7 SP1 and Windows Server 2008 R2 SP1 (KB 4344152)</span></li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344149\" managed-link=\"\" target=\"_blank\">4344149</a> Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1 and Server 2008 SP2\u00a0 (KB 4344149)</li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344146\" managed-link=\"\" target=\"_blank\">4344146</a> Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1, Server 2008 R2 SP1 and for .NET Framework 4.6 for Server 2008 SP2 (KB 4344146)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-14T17:08:04", "type": "mskb", "title": "Security and Quality Rollup updates for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4345590)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T17:08:04", "id": "KB4345590", "href": "https://support.microsoft.com/en-us/help/4345590/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:03", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7.1, and 4.7.2 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see [4019990](<https://support.microsoft.com/en-us/help/4019990>).\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows Server 2012, see the following article in the Microsoft Knowledge Base:[4345680](<https://support.microsoft.com/help/4345680>) Security Only updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4345680)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345680>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345680** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update does not replace any previously released update.\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8-RT-KB4344165-x64.msu| E1FFBB2548AF3E741CA430691324B13AF080E08F| 9787E7078974505416D239CEAEFD7887DF9F85CD3F3F187BC14547F6B8282C33 \nWindows8-RT-KB4344165-x86.msu| 6A7476194F48E9D617E223FD90BA067278F2A102| 2713C5EB9961CACBDC5A006BDE467C2E8DC96A9651F25D2E1B9A24D10407774A \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 25-Jul-2018| 02:50 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \nclrjit.dll| 4.7.3133.0| 524,288| 25-Jul-2018| 02:50 \nclr.dll| 4.7.3133.0| 7,249,400| 25-Jul-2018| 02:50 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 25-Jul-2018| 02:50 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 11-May-2018| 01:43 \npeverify.dll| 4.7.3133.0| 189,960| 25-Jul-2018| 02:50 \nsos.dll| 4.7.3133.0| 744,952| 25-Jul-2018| 02:50 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.7.3133.0| 5,420,992| 25-Jul-2018| 02:09 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \nclrjit.dll| 4.7.3133.0| 1,227,192| 25-Jul-2018| 02:09 \nclr.dll| 4.7.3133.0| 10,378,664| 25-Jul-2018| 02:09 \ncompatjit.dll| 4.7.3133.0| 1,262,528| 25-Jul-2018| 02:09 \nmscordacwks.dll| 4.7.3133.0| 1,843,656| 25-Jul-2018| 02:09 \nmscordbi.dll| 4.7.3133.0| 1,625,024| 25-Jul-2018| 02:09 \nmsvcp120_clr0400.dll| 12.0.52519.0| 690,008| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 993,632| 11-May-2018| 01:43 \npeverify.dll| 4.7.3133.0| 263,104| 25-Jul-2018| 02:09 \nsos.dll| 4.7.3133.0| 874,920| 25-Jul-2018| 02:09 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 25-Jul-2018| 02:50 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \nclrjit.dll| 4.7.3133.0| 524,288| 25-Jul-2018| 02:50 \nclr.dll| 4.7.3133.0| 7,249,400| 25-Jul-2018| 02:50 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 25-Jul-2018| 02:50 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 11-May-2018| 01:43 \npeverify.dll| 4.7.3133.0| 189,960| 25-Jul-2018| 02:50 \nsos.dll| 4.7.3133.0| 744,952| 25-Jul-2018| 02:50 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4344165)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344165", "href": "https://support.microsoft.com/en-us/help/4344165", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:00", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require the d3dcompiler_47.dll update to be installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll update, see [KB 4019990](<https://support.microsoft.com/en-us/help/4019990>) for Windows 7 SP1 and Windows Server 2008 R2 SP1. Or, see [KB 4019478](<https://support.microsoft.com/en-us/help/4019478>) for Windows Server 2008 SP2.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1, see the following article in the Microsoft Knowledge Base:[4345590](<https://support.microsoft.com/help/4345590>) Security and Quality Rollup updates for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4345590)For more information about this security update as it relates to Windows Server 2008, see the following article in the Microsoft Knowledge Base:[4345593](<https://support.microsoft.com/help/4345593>) Security and Quality updates for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 for Windows Server 2008 SP2 (KB 4345593)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345590** for Windows 7 SP1 and Windows Server 2008 R2 SP1 or type **4345593** for Windows Server 2008 SP2 in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nFor Windows 7 SP1 and Windows Server 2008 R2 SP1, this update replaces previously released updates [4340556](<https://support.microsoft.com/help/4340556>) and [4291493](<https://support.microsoft.com/help/4291493>).For Windows Server 2008, this update replaces previously released updates [4340559](<https://support.microsoft.com/help/4340559>) and [4291501](<https://support.microsoft.com/help/4291501>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nNDP46-KB4344146-x64.exe| EBCCE1A7FC09850933B9F81F42ED6B6EA6311C59| 5571D662B99751F8C3DD43A79CA64101A44BD86B8C93604BC7ED086E2E800216 \nNDP46-KB4344146-x86.exe| FC3433B00A2F4F7EF68C6357F526B0C5B28D2807| 34D7D64898A8E615A1FCC430C95E797A152574284A95A4241838828ABFA7754E \n \n\n\n## File attributes \n\nThe English (United States) version of this hotfix installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nAspnet_perf.dll| 4.7.3130.0| 42,656| 27-Jul-2018| 20:45 \naspnet_wp.exe| 4.7.3130.0| 46,184| 27-Jul-2018| 20:45 \nclr.dll| 4.7.3133.0| 7,249,400| 27-Jul-2018| 20:45 \nclrjit.dll| 4.7.3133.0| 524,288| 27-Jul-2018| 20:45 \ndfdll.dll| 4.7.3130.0| 159,880| 27-Jul-2018| 20:45 \nGlobalUserInterface.CompositeFont| | 186,009| 27-Jul-2018| 20:46 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 27-Jul-2018| 20:45 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 27-Jul-2018| 20:45 \nmscoreei.dll| 4.7.3130.0| 513,176| 27-Jul-2018| 20:45 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 27-Jul-2018| 20:45 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 27-Jul-2018| 20:48 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 27-Jul-2018| 20:48 \nVsVersion.dll| 14.7.3130.0| 19,096| 27-Jul-2018| 20:45 \npeverify.dll| 4.7.3133.0| 189,960| 27-Jul-2018| 20:45 \nPresentationCore.dll| 4.7.3130.0| 3,636,560| 27-Jul-2018| 20:46 \nPresentationFramework.dll| 4.7.3130.0| 6,235,496| 27-Jul-2018| 20:46 \nPresentationFramework-SystemData.dll| 4.7.3130.0| 24,312| 27-Jul-2018| 20:46 \nPresentationHost_v0400.dll| 4.7.3130.0| 214,224| 27-Jul-2018| 20:46 \nPresentationHost_v0400.dll.mui| 4.7.3130.0| 84,704| 27-Jul-2018| 20:46 \nPresentationNative_v0400.dll| 4.7.3130.0| 827,096| 27-Jul-2018| 20:46 \nServiceMonikerSupport.dll| 4.7.3130.0| 29,384| 27-Jul-2018| 20:45 \nSMDiagnostics.dll| 4.7.3130.0| 73,808| 27-Jul-2018| 20:45 \nSOS.dll| 4.7.3133.0| 744,952| 27-Jul-2018| 20:45 \nSystem.Activities.dll| 4.7.3130.0| 1,532,544| 27-Jul-2018| 20:45 \nSystem.ComponentModel.DataAnnotations.dll| 4.7.3130.0| 127,200| 27-Jul-2018| 20:45 \nSystem.Core.dll| 4.7.3130.0| 1,551,944| 27-Jul-2018| 20:45 \nSystem.Data.Entity.dll| 4.7.3130.0| 4,034,240| 27-Jul-2018| 20:45 \nSystem.DirectoryServices.AccountManagement.dll| 4.7.3130.0| 296,224| 27-Jul-2018| 20:45 \nSystem.IdentityModel.dll| 4.7.3130.0| 1,090,176| 27-Jul-2018| 20:45 \nSystem.IdentityModel.Services.dll| 4.7.3130.0| 198,376| 27-Jul-2018| 20:45 \nSystem.Runtime.Serialization.dll| 4.7.3130.0| 1,056,456| 27-Jul-2018| 20:46 \nSystem.ServiceModel.Channels.dll| 4.7.3130.0| 157,928| 27-Jul-2018| 20:46 \nSystem.ServiceModel.Discovery.dll| 4.7.3130.0| 308,456| 27-Jul-2018| 20:46 \nSystem.ServiceModel.dll| 4.7.3130.0| 6,321,784| 27-Jul-2018| 20:46 \nSystem.ServiceModel.Internals.dll| 4.7.3130.0| 260,808| 27-Jul-2018| 20:46 \nSystem.ServiceModel.Routing.dll| 4.7.3130.0| 130,784| 27-Jul-2018| 20:46 \nSystem.ServiceModel.WasHosting.dll| 4.7.3130.0| 39,656| 27-Jul-2018| 20:46 \nSystem.Web.ApplicationServices.dll| 4.7.3130.0| 70,840| 27-Jul-2018| 20:45 \nSystem.Web.Extensions.dll| 4.7.3130.0| 1,849,472| 27-Jul-2018| 20:45 \nSystem.Workflow.Activities.dll| 4.7.3130.0| 1,051,360| 27-Jul-2018| 20:46 \nSystem.Workflow.ComponentModel.dll| 4.7.3130.0| 1,542,384| 27-Jul-2018| 20:46 \nSystem.Workflow.Runtime.dll| 4.7.3130.0| 498,896| 27-Jul-2018| 20:46 \nSystem.Runtime.Caching.dll| 4.7.3130.0| 109,776| 27-Jul-2018| 20:45 \nSystem.Data.dll| 4.7.3130.0| 3,458,720| 27-Jul-2018| 20:45 \nSystem.Data.SqlXml.dll| 4.7.3130.0| 734,320| 27-Jul-2018| 20:45 \nSystem.Deployment.dll| 4.7.3130.0| 879,232| 27-Jul-2018| 20:45 \nSystem.DirectoryServices.Protocols.dll| 4.7.3130.0| 201,424| 27-Jul-2018| 20:45 \nSystem.dll| 4.7.3151.0| 3,555,872| 27-Jul-2018| 20:48 \nSystem.Drawing.dll| 4.7.3130.0| 600,664| 27-Jul-2018| 20:45 \nSystem.Management.dll| 4.7.3130.0| 415,336| 27-Jul-2018| 20:45 \nSystem.Net.Http.dll| 4.7.3130.0| 204,384| 27-Jul-2018| 20:45 \nSystem.Runtime.Remoting.dll| 4.7.3130.0| 347,280| 27-Jul-2018| 20:45 \nSystem.Security.dll| 4.7.3130.0| 325,728| 27-Jul-2018| 20:45 \nSystem.Transactions.dll| 4.7.3130.0| 307,392| 27-Jul-2018| 20:45 \nSystem.Web.dll| 4.7.3130.0| 5,416,096| 27-Jul-2018| 20:45 \nSystem.Windows.Controls.Ribbon.dll| 4.7.3130.0| 742,640| 27-Jul-2018| 20:46 \nSystem.Windows.Forms.dll| 4.7.3130.0| 5,236,864| 27-Jul-2018| 20:45 \nSystem.Xaml.dll| 4.7.3130.0| 642,120| 27-Jul-2018| 20:46 \nSystem.Xml.dll| 4.7.3130.0| 2,670,144| 27-Jul-2018| 20:45 \nUIAutomationClient.dll| 4.7.3130.0| 178,008| 27-Jul-2018| 20:46 \nUIAutomationClientsideProviders.dll| 4.7.3130.0| 361,360| 27-Jul-2018| 20:46 \nUIAutomationProvider.dll| 4.7.3130.0| 48,992| 27-Jul-2018| 20:46 \nUIAutomationTypes.dll| 4.7.3130.0| 221,016| 27-Jul-2018| 20:46 \nwebengine.dll| 4.7.3130.0| 24,752| 27-Jul-2018| 20:45 \nwebengine4.dll| 4.7.3130.0| 550,040| 27-Jul-2018| 20:45 \nWindowsBase.dll| 4.7.3130.0| 1,292,112| 27-Jul-2018| 20:46 \nWMINet_Utils.dll| 4.7.3130.0| 136,360| 27-Jul-2018| 20:45 \nWorkflowServiceHostPerformanceCounters.dll| 4.7.3130.0| 89,384| 27-Jul-2018| 20:46 \nWPFFontCache_v0400.exe.mui| 4.7.3130.0| 19,152| 27-Jul-2018| 20:46 \nWPFFontCache_v0400.exe| 4.7.3130.0| 25,704| 27-Jul-2018| 20:46 \nwpfgfx_v0400.dll| 4.7.3130.0| 1,345,184| 27-Jul-2018| 20:46 \nPlaceholder.dll| 4.7.3130.0| 24,736| 27-Jul-2018| 20:46 \nPenIMC2_v0400.dll| 4.7.3130.0| 86,184| 27-Jul-2018| 20:46 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nAspnet_perf.dll| 4.7.3130.0| 46,240| 27-Jul-2018| 20:46 \nAspnet_perf.dll| 4.7.3130.0| 42,656| 27-Jul-2018| 20:45 \naspnet_wp.exe| 4.7.3130.0| 50,792| 27-Jul-2018| 20:46 \naspnet_wp.exe| 4.7.3130.0| 46,184| 27-Jul-2018| 20:45 \nclr.dll| 4.7.3133.0| 10,378,664| 27-Jul-2018| 20:46 \nclr.dll| 4.7.3133.0| 7,249,400| 27-Jul-2018| 20:45 \nclrjit.dll| 4.7.3133.0| 1,227,192| 27-Jul-2018| 20:46 \nclrjit.dll| 4.7.3133.0| 524,288| 27-Jul-2018| 20:45 \ncompatjit.dll| 4.7.3133.0| 1,262,528| 27-Jul-2018| 20:46 \ndfdll.dll| 4.7.3130.0| 191,624| 27-Jul-2018| 20:46 \ndfdll.dll| 4.7.3130.0| 159,880| 27-Jul-2018| 20:45 \nGlobalUserInterface.CompositeFont| | 186,009| 27-Jul-2018| 20:46 \nmscordacwks.dll| 4.7.3133.0| 1,843,656| 27-Jul-2018| 20:46 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 27-Jul-2018| 20:45 \nmscordbi.dll| 4.7.3133.0| 1,625,024| 27-Jul-2018| 20:46 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 27-Jul-2018| 20:45 \nmscoreei.dll| 4.7.3130.0| 632,464| 27-Jul-2018| 20:46 \nmscoreei.dll| 4.7.3130.0| 513,176| 27-Jul-2018| 20:45 \nmscorlib.dll| 4.7.3133.0| 5,420,992| 27-Jul-2018| 20:46 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 27-Jul-2018| 20:45 \nmsvcp120_clr0400.dll| 12.0.52519.0| 690,008| 28-Jul-2018| 00:29 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 27-Jul-2018| 20:48 \nmsvcr120_clr0400.dll| 12.0.52519.0| 993,632| 28-Jul-2018| 00:29 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 27-Jul-2018| 20:48 \nVsVersion.dll| 14.7.3130.0| 19,096| 27-Jul-2018| 20:46 \nVsVersion.dll| 14.7.3130.0| 19,096| 27-Jul-2018| 20:45 \npeverify.dll| 4.7.3133.0| 263,104| 27-Jul-2018| 20:46 \npeverify.dll| 4.7.3133.0| 189,960| 27-Jul-2018| 20:45 \nPresentationCore.dll| 4.7.3130.0| 3,613,368| 27-Jul-2018| 20:46 \nPresentationCore.dll| 4.7.3130.0| 3,636,560| 27-Jul-2018| 20:46 \nPresentationFramework.dll| 4.7.3130.0| 6,235,496| 27-Jul-2018| 20:46 \nPresentationFramework-SystemData.dll| 4.7.3130.0| 24,312| 27-Jul-2018| 20:46 \nPresentationHost_v0400.dll| 4.7.3130.0| 277,712| 27-Jul-2018| 20:46 \nPresentationHost_v0400.dll.mui| 4.7.3130.0| 84,704| 27-Jul-2018| 20:46 \nPresentationHost_v0400.dll| 4.7.3130.0| 214,224| 27-Jul-2018| 20:46 \nPresentationHost_v0400.dll.mui| 4.7.3130.0| 84,704| 27-Jul-2018| 20:46 \nPresentationNative_v0400.dll| 4.7.3130.0| 1,109,712| 27-Jul-2018| 20:46 \nPresentationNative_v0400.dll| 4.7.3130.0| 827,096| 27-Jul-2018| 20:46 \nServiceMonikerSupport.dll| 4.7.3130.0| 31,456| 27-Jul-2018| 20:46 \nServiceMonikerSupport.dll| 4.7.3130.0| 29,384| 27-Jul-2018| 20:45 \nSMDiagnostics.dll| 4.7.3130.0| 73,808| 27-Jul-2018| 20:45 \nSOS.dll| 4.7.3133.0| 874,920| 27-Jul-2018| 20:46 \nSOS.dll| 4.7.3133.0| 744,952| 27-Jul-2018| 20:45 \nSystem.Activities.dll| 4.7.3130.0| 1,532,544| 27-Jul-2018| 20:45 \nSystem.ComponentModel.DataAnnotations.dll| 4.7.3130.0| 127,200| 27-Jul-2018| 20:45 \nSystem.Core.dll| 4.7.3130.0| 1,551,944| 27-Jul-2018| 20:45 \nSystem.Data.Entity.dll| 4.7.3130.0| 4,034,240| 27-Jul-2018| 20:45 \nSystem.DirectoryServices.AccountManagement.dll| 4.7.3130.0| 296,224| 27-Jul-2018| 20:45 \nSystem.IdentityModel.dll| 4.7.3130.0| 1,090,176| 27-Jul-2018| 20:45 \nSystem.IdentityModel.Services.dll| 4.7.3130.0| 198,376| 27-Jul-2018| 20:45 \nSystem.Runtime.Serialization.dll| 4.7.3130.0| 1,056,456| 27-Jul-2018| 20:46 \nSystem.ServiceModel.Channels.dll| 4.7.3130.0| 157,928| 27-Jul-2018| 20:46 \nSystem.ServiceModel.Discovery.dll| 4.7.3130.0| 308,456| 27-Jul-2018| 20:46 \nSystem.ServiceModel.dll| 4.7.3130.0| 6,321,784| 27-Jul-2018| 20:46 \nSystem.ServiceModel.Internals.dll| 4.7.3130.0| 260,808| 27-Jul-2018| 20:46 \nSystem.ServiceModel.Routing.dll| 4.7.3130.0| 130,784| 27-Jul-2018| 20:46 \nSystem.ServiceModel.WasHosting.dll| 4.7.3130.0| 39,656| 27-Jul-2018| 20:46 \nSystem.Web.ApplicationServices.dll| 4.7.3130.0| 70,840| 27-Jul-2018| 20:45 \nSystem.Web.Extensions.dll| 4.7.3130.0| 1,849,472| 27-Jul-2018| 20:45 \nSystem.Workflow.Activities.dll| 4.7.3130.0| 1,051,360| 27-Jul-2018| 20:46 \nSystem.Workflow.ComponentModel.dll| 4.7.3130.0| 1,542,384| 27-Jul-2018| 20:46 \nSystem.Workflow.Runtime.dll| 4.7.3130.0| 498,896| 27-Jul-2018| 20:46 \nSystem.Runtime.Caching.dll| 4.7.3130.0| 109,776| 27-Jul-2018| 20:45 \nSystem.Data.dll| 4.7.3130.0| 3,520,672| 27-Jul-2018| 20:46 \nSystem.Data.dll| 4.7.3130.0| 3,458,720| 27-Jul-2018| 20:45 \nSystem.Data.SqlXml.dll| 4.7.3130.0| 734,320| 27-Jul-2018| 20:45 \nSystem.Deployment.dll| 4.7.3130.0| 879,232| 27-Jul-2018| 20:45 \nSystem.DirectoryServices.Protocols.dll| 4.7.3130.0| 201,424| 27-Jul-2018| 20:45 \nSystem.dll| 4.7.3151.0| 3,555,872| 27-Jul-2018| 20:48 \nSystem.Drawing.dll| 4.7.3130.0| 600,664| 27-Jul-2018| 20:45 \nSystem.Management.dll| 4.7.3130.0| 415,336| 27-Jul-2018| 20:45 \nSystem.Net.Http.dll| 4.7.3130.0| 204,384| 27-Jul-2018| 20:45 \nSystem.Runtime.Remoting.dll| 4.7.3130.0| 347,280| 27-Jul-2018| 20:45 \nSystem.Security.dll| 4.7.3130.0| 325,728| 27-Jul-2018| 20:45 \nSystem.Transactions.dll| 4.7.3130.0| 310,464| 27-Jul-2018| 20:46 \nSystem.Transactions.dll| 4.7.3130.0| 307,392| 27-Jul-2018| 20:45 \nSystem.Web.dll| 4.7.3130.0| 5,398,192| 27-Jul-2018| 20:46 \nSystem.Web.dll| 4.7.3130.0| 5,416,096| 27-Jul-2018| 20:45 \nSystem.Windows.Controls.Ribbon.dll| 4.7.3130.0| 742,640| 27-Jul-2018| 20:46 \nSystem.Windows.Forms.dll| 4.7.3130.0| 5,236,864| 27-Jul-2018| 20:45 \nSystem.Xaml.dll| 4.7.3130.0| 642,120| 27-Jul-2018| 20:46 \nSystem.XML.dll| 4.7.3130.0| 2,670,144| 27-Jul-2018| 20:45 \nUIAutomationClient.dll| 4.7.3130.0| 178,008| 27-Jul-2018| 20:46 \nUIAutomationClientsideProviders.dll| 4.7.3130.0| 361,360| 27-Jul-2018| 20:46 \nUIAutomationProvider.dll| 4.7.3130.0| 48,992| 27-Jul-2018| 20:46 \nUIAutomationTypes.dll| 4.7.3130.0| 221,016| 27-Jul-2018| 20:46 \nwebengine.dll| 4.7.3130.0| 26,264| 27-Jul-2018| 20:46 \nwebengine.dll| 4.7.3130.0| 24,752| 27-Jul-2018| 20:45 \nwebengine4.dll| 4.7.3130.0| 667,296| 27-Jul-2018| 20:46 \nwebengine4.dll| 4.7.3130.0| 550,040| 27-Jul-2018| 20:45 \nWindowsBase.dll| 4.7.3130.0| 1,292,112| 27-Jul-2018| 20:46 \nWMINet_Utils.dll| 4.7.3130.0| 188,072| 27-Jul-2018| 20:46 \nWMINet_Utils.dll| 4.7.3130.0| 136,360| 27-Jul-2018| 20:45 \nWorkflowServiceHostPerformanceCounters.dll| 4.7.3130.0| 101,136| 27-Jul-2018| 20:46 \nWorkflowServiceHostPerformanceCounters.dll| 4.7.3130.0| 89,384| 27-Jul-2018| 20:46 \nWPFFontCache_v0400.exe.mui| 4.7.3130.0| 19,168| 27-Jul-2018| 20:46 \nWPFFontCache_v0400.exe.mui| 4.7.3130.0| 19,152| 27-Jul-2018| 20:46 \nWPFFontCache_v0400.exe| 4.7.3130.0| 26,728| 27-Jul-2018| 20:46 \nWPFFontCache_v0400.exe| 4.7.3130.0| 25,704| 27-Jul-2018| 20:46 \nwpfgfx_v0400.dll| 4.7.3130.0| 1,764,520| 27-Jul-2018| 20:46 \nwpfgfx_v0400.dll| 4.7.3130.0| 1,345,184| 27-Jul-2018| 20:46 \nPlaceholder.dll| 4.7.3130.0| 25,760| 27-Jul-2018| 20:46 \nPlaceholder.dll| 4.7.3130.0| 24,736| 27-Jul-2018| 20:46 \nPenIMC2_v0400.dll| 4.7.3130.0| 104,616| 27-Jul-2018| 20:46 \nPenIMC2_v0400.dll| 4.7.3130.0| 86,184| 27-Jul-2018| 20:46 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1, and for .NET Framework 4.6 for Server 2008 SP2 (KB 4344146)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344146", "href": "https://support.microsoft.com/en-us/help/4344146", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T22:52:00", "description": "<html><body><p>Resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments.</p><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections where content from one stream can blend into another stream.</p><p>To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.</p><p>This security update addresses the vulnerability by correcting the way .NET Framework handles high-load/high-density network connections.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360\" id=\"kb-link-2\" target=\"\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8360</a>.</div><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4344151\" managed-link=\"\">4344151</a> Description of the Security and Quality Rollup for .NET Framework 2.0 SP2 and 3.0 SP2 for Windows Server 2008 SP2 (KB 4344151)</span></li><li><a href=\"https://support.microsoft.com/help/4344149\" managed-link=\"\">4344149</a> Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1 and Server 2008 SP2\u00a0 (KB 4344149)</li><li><a href=\"https://support.microsoft.com/help/4344146\" managed-link=\"\">4344146</a> Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 and 4.7.2 for Windows 7 SP1, Server 2008 R2 SP1 and for .NET Framework 4.6 for Server 2008 SP2 (KB 4344146)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-14T17:08:06", "type": "mskb", "title": "Security and Quality updates for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2 and 4.6 for Windows Server 2008 SP2 (KB 4345593)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T17:08:06", "id": "KB4345593", "href": "https://support.microsoft.com/en-us/help/4345593/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:06", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1, see the following article in the Microsoft Knowledge Base:[4345679](<https://support.microsoft.com/help/4345679>) Security Only updates for .NET Framework 3.5.1, 4.5.2 and 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4345679)For more information about this security update as it relates to Windows Server 2008 SP2, see the following article in the Microsoft Knowledge Base:[4345682](<https://support.microsoft.com/help/4345682>) Security Only updates for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2 and 4.6 for Windows Server 2008 SP2 (KB 4345682)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the Microsoft Update Catalog.\n\n * For Windows 7 SP1 and Windows Server 2008 R2 SP1, go to update [KB 4345679](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345679>).\n * For Windows Server 2008, go to update [KB 4345682](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345682>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345679** for Windows 7 SP1 and Windows Server 2008 R2 SP1 or type **4345682** for Windows Server 2008 SP2 in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces update [4020507](<https://support.microsoft.com/help/4020507>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nNDP45-KB4344173-x64.exe| DFE292179D0EC314BEFE2C9C1B72F1B8E40882F1| 518517C3823F4421CCA3DAAAEE8CE48AFA091F74C33D3512E0A3E06B5B592F44 \nNDP45-KB4344173-x86.exe| 15580CE80ECBE44BA48C1DDFDEA40D2FD4D8B915| C03D41FC29A61EB52178C226E5FE992C4A4F151FAE8511631DD713173AB9CDD3 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nclr.dll| 4.0.30319.36460| 6,939,640| 27-Jul-2018| 07:43 \nclrjit.dll| 4.0.30319.36460| 510,464| 27-Jul-2018| 07:43 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 27-Jul-2018| 07:43 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 27-Jul-2018| 07:43 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 27-Jul-2018| 07:43 \npeverify.dll| 4.0.30319.36460| 163,968| 27-Jul-2018| 07:44 \nSOS.dll| 4.0.30319.36460| 762,472| 27-Jul-2018| 07:43 \nSystem.dll| 4.0.30319.36460| 3,490,240| 27-Jul-2018| 07:43 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 27-Jul-2018| 07:43 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 27-Jul-2018| 07:43 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nclr.dll| 4.0.30319.36460| 10,070,120| 27-Jul-2018| 08:20 \nclr.dll| 4.0.30319.36460| 6,939,640| 27-Jul-2018| 07:43 \nclrjit.dll| 4.0.30319.36460| 1,234,552| 27-Jul-2018| 08:20 \nclrjit.dll| 4.0.30319.36460| 510,464| 27-Jul-2018| 07:43 \nmscordacwks.dll| 4.0.30319.36460| 1,731,208| 27-Jul-2018| 08:20 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 27-Jul-2018| 07:43 \nmscordbi.dll| 4.0.30319.36460| 1,533,568| 27-Jul-2018| 08:20 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 27-Jul-2018| 07:43 \nmscorlib.dll| 4.0.30319.36460| 5,219,968| 27-Jul-2018| 08:20 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 27-Jul-2018| 07:43 \npeverify.dll| 4.0.30319.36460| 225,920| 27-Jul-2018| 08:20 \npeverify.dll| 4.0.30319.36460| 163,968| 27-Jul-2018| 07:44 \nSOS.dll| 4.0.30319.36460| 822,888| 27-Jul-2018| 08:20 \nSOS.dll| 4.0.30319.36460| 762,472| 27-Jul-2018| 07:43 \nSystem.dll| 4.0.30319.36460| 3,490,240| 27-Jul-2018| 07:43 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 678,584| 27-Jul-2018| 08:20 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 27-Jul-2018| 07:43 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 869,536| 27-Jul-2018| 08:20 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 27-Jul-2018| 07:43 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 SP2 (KB 4344173)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344173", "href": "https://support.microsoft.com/en-us/help/4344173", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:04", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7.1, and 4.7.2 require the d3dcompiler_47.dll update to be installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll update, see [KB 4019990](<https://support.microsoft.com/en-us/help/4019990>) for Windows 7 SP1 and Windows Server 2008 R2 SP1. Or, see [KB 4019478](<https://support.microsoft.com/en-us/help/4019478>) for Windows Server 2008 SP2.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1, see the following article in the Microsoft Knowledge Base:[4345679](<https://support.microsoft.com/help/4345679>) Security Only updates for .NET Framework 3.5.1, 4.5.2 and 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4345679)For more information about this security update as it relates to Windows Server 2008, see the following article in the Microsoft Knowledge Base:[4345682](<https://support.microsoft.com/help/4345682>) Security Only updates for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 for Windows Server 2008 SP2 (KB 4345682)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the Microsoft Update Catalog.\n\n * For Windows 7 SP1 and Windows Server 2008 R2 SP1, go to update [KB 4345679](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345679>).\n * For Windows Server 2008, go to update [KB 4345682](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345682>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345679** for Windows 7 SP1 and Windows Server 2008 R2 SP1 or type **4345682** for Windows Server 2008 SP2 in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update does not replace any previously released update.\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nNDP46-KB4344167-x64.exe| ADC94283059DB5F102AA2180C73D8570F0EFC9C5| 604A497C1BFE532E19F821084391D48852D0E2FF94C62B25A913354B96949DC8 \nNDP46-KB4344167-x86.exe| 0D6D228F87DBA8CA0F37AA3B017B7DD590DE8EF0| 3963AB60A34362DFE20EAF85B0125395754FC33CC163B81190AEA17531A0C9EE \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nclr.dll| 4.7.3133.0| 7,249,400| 27-Jul-2018| 19:16 \nclrjit.dll| 4.7.3133.0| 524,288| 27-Jul-2018| 19:16 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 27-Jul-2018| 19:16 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 27-Jul-2018| 19:16 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 27-Jul-2018| 19:16 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 27-Jul-2018| 19:20 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 27-Jul-2018| 19:20 \npeverify.dll| 4.7.3133.0| 189,960| 27-Jul-2018| 19:16 \nSOS.dll| 4.7.3133.0| 744,952| 27-Jul-2018| 19:16 \nSystem.dll| 4.7.3151.0| 3,555,872| 27-Jul-2018| 19:19 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nclr.dll| 4.7.3133.0| 10,378,664| 27-Jul-2018| 19:16 \nclr.dll| 4.7.3133.0| 7,249,400| 27-Jul-2018| 19:16 \nclrjit.dll| 4.7.3133.0| 1,227,192| 27-Jul-2018| 19:16 \nclrjit.dll| 4.7.3133.0| 524,288| 27-Jul-2018| 19:16 \ncompatjit.dll| 4.7.3133.0| 1,262,528| 27-Jul-2018| 19:16 \nmscordacwks.dll| 4.7.3133.0| 1,843,656| 27-Jul-2018| 19:16 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 27-Jul-2018| 19:16 \nmscordbi.dll| 4.7.3133.0| 1,625,024| 27-Jul-2018| 19:16 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 27-Jul-2018| 19:16 \nmscorlib.dll| 4.7.3133.0| 5,420,992| 27-Jul-2018| 19:16 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 27-Jul-2018| 19:16 \nmsvcp120_clr0400.dll| 12.0.52519.0| 690,008| 27-Jul-2018| 19:35 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 27-Jul-2018| 19:20 \nmsvcr120_clr0400.dll| 12.0.52519.0| 993,632| 27-Jul-2018| 19:35 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 27-Jul-2018| 19:20 \npeverify.dll| 4.7.3133.0| 263,104| 27-Jul-2018| 19:16 \npeverify.dll| 4.7.3133.0| 189,960| 27-Jul-2018| 19:16 \nSOS.dll| 4.7.3133.0| 874,920| 27-Jul-2018| 19:16 \nSOS.dll| 4.7.3133.0| 744,952| 27-Jul-2018| 19:16 \nSystem.dll| 4.7.3151.0| 3,555,872| 27-Jul-2018| 19:19 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1, and for .NET Framework 4.6 for Server 2008 SP2 (KB 4344167)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344167", "href": "https://support.microsoft.com/en-us/help/4344167", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:13:58", "description": "None\n## Summary\n\nThis update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see [KB 4019990](<https://support.microsoft.com/en-us/help/4019990>).\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows Server 2012, see the following article in the Microsoft Knowledge Base:[4345591](<https://support.microsoft.com/help/4345591>) Security and Quality Rollup updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4345591)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345591** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces previously released updates [4340557](<https://support.microsoft.com/help/4340557>) and [4291495.](<https://support.microsoft.com/help/4291495>)\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8-RT-KB4344144-x64.msu| 27D8B0530661DF18D8BA990A4BC29534806D4C91| 52DE596AAAD029D9CB4EE92203CFE73B26C9871EFEC2B29B2A57C455D8EFE0BB \nWindows8-RT-KB4344144-x86.msu| C38A636706ED5E0C05801D2CC27430D064DD7786| 93F2F8BECAF8122ED2DE89764AC0FA8E8A69697E1BF91DA3306F354A0F180F7F \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \npresentationframework.dll| 4.7.2672.0| 6,210,896| 19-Jul-2018| 22:47 \nsmdiagnostics.dll| 4.7.3130.0| 73,808| 06-Jun-2018| 06:16 \nsystem.activities.dll| 4.7.3130.0| 1,532,544| 06-Jun-2018| 06:16 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.data.sqlxml.dll| 4.7.2612.0| 734,400| 22-Nov-2017| 20:59 \nsystem.deployment.dll| 4.6.1099.0| 846,016| 27-Mar-2017| 03:33 \nsystem.directoryservices.accountmanagement.dll| 4.7.2623.0| 296,216| 30-Nov-2017| 04:16 \nsystem.directoryservices.protocols.dll| 4.6.1099.0| 200,488| 27-Mar-2017| 03:33 \nsystem.drawing.dll| 4.6.1099.0| 594,616| 27-Mar-2017| 03:33 \nsystem.identitymodel.services.dll| 4.7.3130.0| 198,376| 06-Jun-2018| 06:16 \nsystem.identitymodel.dll| 4.7.3130.0| 1,090,176| 06-Jun-2018| 06:16 \nsystem.management.dll| 4.7.2102.0| 415,432| 06-Jun-2017| 23:17 \nsystem.net.http.dll| 4.7.2634.0| 203,352| 02-Feb-2018| 21:11 \nsystem.runtime.caching.dll| 4.6.1649.1| 108,920| 21-Apr-2017| 05:35 \nsystem.runtime.remoting.dll| 4.7.2114.0| 347,368| 30-Aug-2017| 06:04 \nsystem.runtime.serialization.dll| 4.7.3130.0| 1,056,456| 06-Jun-2018| 06:16 \nsystem.security.dll| 4.7.2650.0| 324,696| 21-Mar-2018| 04:49 \nsystem.servicemodel.channels.dll| 4.7.3130.0| 157,928| 06-Jun-2018| 06:16 \nsystem.servicemodel.discovery.dll| 4.7.3130.0| 308,456| 06-Jun-2018| 06:16 \nsystem.servicemodel.internals.dll| 4.7.3130.0| 260,808| 06-Jun-2018| 06:16 \nsystem.servicemodel.routing.dll| 4.6.1099.0| 130,288| 27-Mar-2017| 03:33 \nsystem.servicemodel.washosting.dll| 4.7.3130.0| 39,656| 06-Jun-2018| 06:16 \nsystem.servicemodel.dll| 4.7.3130.0| 6,321,784| 06-Jun-2018| 06:16 \nsystem.web.applicationservices.dll| 4.7.2623.0| 70,912| 30-Nov-2017| 04:16 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nsystem.windows.controls.ribbon.dll| 4.7.2672.0| 742,608| 19-Jul-2018| 22:47 \nsystem.windows.forms.dll| 4.7.2114.0| 5,181,656| 30-Aug-2017| 06:04 \nsystem.workflow.activities.dll| 4.7.3130.0| 1,051,360| 06-Jun-2018| 06:16 \nsystem.workflow.componentmodel.dll| 4.7.3130.0| 1,542,384| 06-Jun-2018| 06:16 \nsystem.workflow.runtime.dll| 4.7.3130.0| 498,896| 06-Jun-2018| 06:16 \nsystem.xaml.dll| 4.7.2672.0| 643,560| 19-Jul-2018| 22:47 \nsystem.xml.dll| 4.7.2612.0| 2,670,224| 22-Nov-2017| 20:59 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nuiautomationclientsideproviders.dll| 4.7.2672.0| 361,336| 19-Jul-2018| 22:47 \nuiautomationclient.dll| 4.7.2672.0| 177,984| 19-Jul-2018| 22:47 \nuiautomationprovider.dll| 4.7.2672.0| 48,968| 19-Jul-2018| 22:47 \nuiautomationtypes.dll| 4.7.2672.0| 220,992| 19-Jul-2018| 22:47 \nwindowsbase.dll| 4.7.2672.0| 1,289,512| 19-Jul-2018| 22:47 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 25-Jul-2018| 02:50 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \naspnet_perf.dll| 4.7.2623.0| 42,648| 30-Nov-2017| 04:16 \naspnet_state_perf.h| | 318| 30-Nov-2017| 02:23 \naspnet_state_perf.ini| | 42,996| 30-Nov-2017| 04:18 \naspnet_wp.exe| 4.7.2623.0| 46,176| 30-Nov-2017| 04:16 \nclrjit.dll| 4.7.3133.0| 524,288| 25-Jul-2018| 02:50 \nclr.dll| 4.7.3133.0| 7,249,400| 25-Jul-2018| 02:50 \ndfdll.dll| 4.6.1099.0| 154,768| 27-Mar-2017| 03:33 \nglobalmonospace.compositefont| | 26,040| 17-May-2018| 04:37 \nglobalsansserif.compositefont| | 26,489| 17-May-2018| 04:37 \nglobalserif.compositefont| | 29,779| 17-May-2018| 04:37 \nglobaluserinterface.compositefont| | 186,009| 19-Jul-2018| 19:11 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 25-Jul-2018| 02:50 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 25-Jul-2018| 02:50 \nmscoreei.dll| 4.6.1099.0| 497,824| 27-Mar-2017| 03:33 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 11-May-2018| 01:43 \npenimc.dll| 14.7.2634.0| 19,096| 02-Feb-2018| 21:11 \npenimc2_v0400.dll| 4.7.2672.0| 86,160| 19-Jul-2018| 22:47 \npenimc_v0400.dll| 4.7.2634.0| 24,728| 02-Feb-2018| 21:11 \npeverify.dll| 4.7.3133.0| 189,960| 25-Jul-2018| 02:50 \npresentationhost_v0400.dll.mui| 4.7.2672.0| 84,704| 19-Jul-2018| 22:47 \npresentationhost_v0400.dll| 4.7.2672.0| 214,200| 19-Jul-2018| 22:47 \npresentationnative_v0400.dll| 4.7.2672.0| 827,096| 19-Jul-2018| 22:47 \nservicemodel.mof| | 88,383| 11-May-2018| 01:26 \nservicemodel.mof.uninstall| | 896| 11-May-2018| 01:26 \nservicemonikersupport.dll| 4.7.3130.0| 29,384| 06-Jun-2018| 06:16 \nsos.dll| 4.7.3133.0| 744,952| 25-Jul-2018| 02:50 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nwebengine4.dll| 4.7.2623.0| 550,032| 30-Nov-2017| 04:16 \nwebengine.dll| 4.7.2623.0| 24,712| 30-Nov-2017| 04:16 \nwminet_utils.dll| 4.7.2102.0| 136,368| 06-Jun-2017| 23:17 \nworkflowservicehostperformancecounters.dll| 4.7.3130.0| 89,384| 06-Jun-2018| 06:16 \nwpfgfx_v0400.dll| 4.7.2672.0| 1,345,160| 19-Jul-2018| 22:47 \npresentationcore.dll| 4.7.2672.0| 3,635,024| 19-Jul-2018| 22:47 \nsystem.data.dll| 4.7.2623.0| 3,397,272| 30-Nov-2017| 04:16 \nsystem.transactions.dll| 4.6.1099.0| 303,824| 27-Mar-2017| 03:33 \nsystem.web.dll| 4.7.2623.0| 5,409,936| 30-Nov-2017| 04:16 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.7.3133.0| 5,420,992| 25-Jul-2018| 02:09 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \naspnet_perf.dll| 4.7.2623.0| 46,232| 30-Nov-2017| 04:12 \naspnet_state_perf.h| | 318| 30-Nov-2017| 02:05 \naspnet_state_perf.ini| | 42,996| 30-Nov-2017| 04:12 \naspnet_wp.exe| 4.7.2623.0| 50,784| 30-Nov-2017| 04:12 \nclrjit.dll| 4.7.3133.0| 1,227,192| 25-Jul-2018| 02:09 \nclr.dll| 4.7.3133.0| 10,378,664| 25-Jul-2018| 02:09 \ncompatjit.dll| 4.7.3133.0| 1,262,528| 25-Jul-2018| 02:09 \ndfdll.dll| 4.6.1099.0| 181,400| 27-Mar-2017| 03:29 \nglobalmonospace.compositefont| | 26,040| 17-May-2018| 04:37 \nglobalsansserif.compositefont| | 26,489| 17-May-2018| 04:37 \nglobalserif.compositefont| | 29,779| 17-May-2018| 04:37 \nglobaluserinterface.compositefont| | 186,009| 19-Jul-2018| 19:11 \nmscordacwks.dll| 4.7.3133.0| 1,843,656| 25-Jul-2018| 02:09 \nmscordbi.dll| 4.7.3133.0| 1,625,024| 25-Jul-2018| 02:09 \nmscoreei.dll| 4.6.1099.0| 617,632| 27-Mar-2017| 03:29 \nmsvcp120_clr0400.dll| 12.0.52519.0| 690,008| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 993,632| 11-May-2018| 01:43 \npenimc.dll| 14.7.2634.0| 19,096| 02-Feb-2018| 21:04 \npenimc2_v0400.dll| 4.7.2672.0| 107,472| 19-Jul-2018| 22:39 \npenimc_v0400.dll| 4.7.2634.0| 25,760| 02-Feb-2018| 21:04 \npeverify.dll| 4.7.3133.0| 263,104| 25-Jul-2018| 02:09 \npresentationframework.dll| 4.7.2672.0| 6,210,896| 19-Jul-2018| 22:47 \npresentationhost_v0400.dll.mui| 4.7.2672.0| 87,560| 19-Jul-2018| 22:39 \npresentationhost_v0400.dll| 4.7.2672.0| 280,568| 19-Jul-2018| 22:39 \npresentationnative_v0400.dll| 4.7.2672.0| 1,112,576| 19-Jul-2018| 22:39 \nservicemodel.mof| | 88,383| 21-Feb-2018| 03:54 \nservicemodel.mof.uninstall| | 896| 21-Feb-2018| 03:54 \nservicemonikersupport.dll| 4.7.3130.0| 31,456| 06-Jun-2018| 06:09 \nsmdiagnostics.dll| 4.7.3130.0| 73,808| 06-Jun-2018| 06:16 \nsos.dll| 4.7.3133.0| 874,920| 25-Jul-2018| 02:09 \nsystem.activities.dll| 4.7.3130.0| 1,532,544| 06-Jun-2018| 06:16 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.data.sqlxml.dll| 4.7.2612.0| 734,400| 22-Nov-2017| 20:59 \nsystem.deployment.dll| 4.6.1099.0| 846,016| 27-Mar-2017| 03:33 \nsystem.directoryservices.accountmanagement.dll| 4.7.2623.0| 296,216| 30-Nov-2017| 04:16 \nsystem.directoryservices.protocols.dll| 4.6.1099.0| 200,488| 27-Mar-2017| 03:33 \nsystem.drawing.dll| 4.6.1099.0| 594,616| 27-Mar-2017| 03:33 \nsystem.identitymodel.services.dll| 4.7.3130.0| 198,376| 06-Jun-2018| 06:16 \nsystem.identitymodel.dll| 4.7.3130.0| 1,090,176| 06-Jun-2018| 06:16 \nsystem.management.dll| 4.7.2102.0| 415,432| 06-Jun-2017| 23:17 \nsystem.net.http.dll| 4.7.2634.0| 203,352| 02-Feb-2018| 21:11 \nsystem.runtime.caching.dll| 4.6.1649.1| 108,920| 21-Apr-2017| 05:35 \nsystem.runtime.remoting.dll| 4.7.2114.0| 347,368| 30-Aug-2017| 06:04 \nsystem.runtime.serialization.dll| 4.7.3130.0| 1,056,456| 06-Jun-2018| 06:16 \nsystem.security.dll| 4.7.2650.0| 324,696| 21-Mar-2018| 04:49 \nsystem.servicemodel.channels.dll| 4.7.3130.0| 157,928| 06-Jun-2018| 06:16 \nsystem.servicemodel.discovery.dll| 4.7.3130.0| 308,456| 06-Jun-2018| 06:16 \nsystem.servicemodel.internals.dll| 4.7.3130.0| 260,808| 06-Jun-2018| 06:16 \nsystem.servicemodel.routing.dll| 4.6.1099.0| 130,288| 27-Mar-2017| 03:33 \nsystem.servicemodel.washosting.dll| 4.7.3130.0| 39,656| 06-Jun-2018| 06:16 \nsystem.servicemodel.dll| 4.7.3130.0| 6,321,784| 06-Jun-2018| 06:16 \nsystem.web.applicationservices.dll| 4.7.2623.0| 70,912| 30-Nov-2017| 04:16 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nsystem.windows.controls.ribbon.dll| 4.7.2672.0| 742,608| 19-Jul-2018| 22:47 \nsystem.windows.forms.dll| 4.7.2114.0| 5,181,656| 30-Aug-2017| 06:04 \nsystem.workflow.activities.dll| 4.7.3130.0| 1,051,360| 06-Jun-2018| 06:16 \nsystem.workflow.componentmodel.dll| 4.7.3130.0| 1,542,384| 06-Jun-2018| 06:16 \nsystem.workflow.runtime.dll| 4.7.3130.0| 498,896| 06-Jun-2018| 06:16 \nsystem.xaml.dll| 4.7.2672.0| 643,560| 19-Jul-2018| 22:47 \nsystem.xml.dll| 4.7.2612.0| 2,670,224| 22-Nov-2017| 20:59 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nuiautomationclientsideproviders.dll| 4.7.2672.0| 361,336| 19-Jul-2018| 22:47 \nuiautomationclient.dll| 4.7.2672.0| 177,984| 19-Jul-2018| 22:47 \nuiautomationprovider.dll| 4.7.2672.0| 48,968| 19-Jul-2018| 22:47 \nuiautomationtypes.dll| 4.7.2672.0| 220,992| 19-Jul-2018| 22:47 \nwebengine4.dll| 4.7.2623.0| 667,792| 30-Nov-2017| 04:12 \nwebengine.dll| 4.7.2623.0| 26,256| 30-Nov-2017| 04:12 \nwindowsbase.dll| 4.7.2672.0| 1,289,512| 19-Jul-2018| 22:47 \nwminet_utils.dll| 4.7.2102.0| 188,088| 06-Jun-2017| 23:13 \nworkflowservicehostperformancecounters.dll| 4.7.3130.0| 101,136| 06-Jun-2018| 06:09 \nwpfgfx_v0400.dll| 4.7.2672.0| 1,766,864| 19-Jul-2018| 22:39 \npresentationcore.dll| 4.7.2672.0| 3,613,760| 19-Jul-2018| 22:39 \nsystem.data.dll| 4.7.2623.0| 3,461,784| 30-Nov-2017| 04:12 \nsystem.transactions.dll| 4.6.1099.0| 306,888| 27-Mar-2017| 03:29 \nsystem.web.dll| 4.7.2623.0| 5,397,136| 30-Nov-2017| 04:12 \npresentationframework.dll| 4.7.2672.0| 6,210,896| 19-Jul-2018| 22:47 \nsmdiagnostics.dll| 4.7.3130.0| 73,808| 06-Jun-2018| 06:16 \nsystem.activities.dll| 4.7.3130.0| 1,532,544| 06-Jun-2018| 06:16 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.data.sqlxml.dll| 4.7.2612.0| 734,400| 22-Nov-2017| 20:59 \nsystem.deployment.dll| 4.6.1099.0| 846,016| 27-Mar-2017| 03:33 \nsystem.directoryservices.accountmanagement.dll| 4.7.2623.0| 296,216| 30-Nov-2017| 04:16 \nsystem.directoryservices.protocols.dll| 4.6.1099.0| 200,488| 27-Mar-2017| 03:33 \nsystem.drawing.dll| 4.6.1099.0| 594,616| 27-Mar-2017| 03:33 \nsystem.identitymodel.services.dll| 4.7.3130.0| 198,376| 06-Jun-2018| 06:16 \nsystem.identitymodel.dll| 4.7.3130.0| 1,090,176| 06-Jun-2018| 06:16 \nsystem.management.dll| 4.7.2102.0| 415,432| 06-Jun-2017| 23:17 \nsystem.net.http.dll| 4.7.2634.0| 203,352| 02-Feb-2018| 21:11 \nsystem.runtime.caching.dll| 4.6.1649.1| 108,920| 21-Apr-2017| 05:35 \nsystem.runtime.remoting.dll| 4.7.2114.0| 347,368| 30-Aug-2017| 06:04 \nsystem.runtime.serialization.dll| 4.7.3130.0| 1,056,456| 06-Jun-2018| 06:16 \nsystem.security.dll| 4.7.2650.0| 324,696| 21-Mar-2018| 04:49 \nsystem.servicemodel.channels.dll| 4.7.3130.0| 157,928| 06-Jun-2018| 06:16 \nsystem.servicemodel.discovery.dll| 4.7.3130.0| 308,456| 06-Jun-2018| 06:16 \nsystem.servicemodel.internals.dll| 4.7.3130.0| 260,808| 06-Jun-2018| 06:16 \nsystem.servicemodel.routing.dll| 4.6.1099.0| 130,288| 27-Mar-2017| 03:33 \nsystem.servicemodel.washosting.dll| 4.7.3130.0| 39,656| 06-Jun-2018| 06:16 \nsystem.servicemodel.dll| 4.7.3130.0| 6,321,784| 06-Jun-2018| 06:16 \nsystem.web.applicationservices.dll| 4.7.2623.0| 70,912| 30-Nov-2017| 04:16 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nsystem.windows.controls.ribbon.dll| 4.7.2672.0| 742,608| 19-Jul-2018| 22:47 \nsystem.windows.forms.dll| 4.7.2114.0| 5,181,656| 30-Aug-2017| 06:04 \nsystem.workflow.activities.dll| 4.7.3130.0| 1,051,360| 06-Jun-2018| 06:16 \nsystem.workflow.componentmodel.dll| 4.7.3130.0| 1,542,384| 06-Jun-2018| 06:16 \nsystem.workflow.runtime.dll| 4.7.3130.0| 498,896| 06-Jun-2018| 06:16 \nsystem.xaml.dll| 4.7.2672.0| 643,560| 19-Jul-2018| 22:47 \nsystem.xml.dll| 4.7.2612.0| 2,670,224| 22-Nov-2017| 20:59 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nuiautomationclientsideproviders.dll| 4.7.2672.0| 361,336| 19-Jul-2018| 22:47 \nuiautomationclient.dll| 4.7.2672.0| 177,984| 19-Jul-2018| 22:47 \nuiautomationprovider.dll| 4.7.2672.0| 48,968| 19-Jul-2018| 22:47 \nuiautomationtypes.dll| 4.7.2672.0| 220,992| 19-Jul-2018| 22:47 \nwindowsbase.dll| 4.7.2672.0| 1,289,512| 19-Jul-2018| 22:47 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 25-Jul-2018| 02:50 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \naspnet_perf.dll| 4.7.2623.0| 42,648| 30-Nov-2017| 04:16 \naspnet_state_perf.h| | 318| 30-Nov-2017| 02:23 \naspnet_state_perf.ini| | 42,996| 30-Nov-2017| 04:18 \naspnet_wp.exe| 4.7.2623.0| 46,176| 30-Nov-2017| 04:16 \nclrjit.dll| 4.7.3133.0| 524,288| 25-Jul-2018| 02:50 \nclr.dll| 4.7.3133.0| 7,249,400| 25-Jul-2018| 02:50 \ndfdll.dll| 4.6.1099.0| 154,768| 27-Mar-2017| 03:33 \nglobalmonospace.compositefont| | 26,040| 17-May-2018| 04:37 \nglobalsansserif.compositefont| | 26,489| 17-May-2018| 04:37 \nglobalserif.compositefont| | 29,779| 17-May-2018| 04:37 \nglobaluserinterface.compositefont| | 186,009| 19-Jul-2018| 19:11 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 25-Jul-2018| 02:50 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 25-Jul-2018| 02:50 \nmscoreei.dll| 4.6.1099.0| 497,824| 27-Mar-2017| 03:33 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 11-May-2018| 01:43 \npenimc.dll| 14.7.2634.0| 19,096| 02-Feb-2018| 21:11 \npenimc2_v0400.dll| 4.7.2672.0| 86,160| 19-Jul-2018| 22:47 \npenimc_v0400.dll| 4.7.2634.0| 24,728| 02-Feb-2018| 21:11 \npeverify.dll| 4.7.3133.0| 189,960| 25-Jul-2018| 02:50 \npresentationhost_v0400.dll.mui| 4.7.2672.0| 84,704| 19-Jul-2018| 22:47 \npresentationhost_v0400.dll| 4.7.2672.0| 214,200| 19-Jul-2018| 22:47 \npresentationnative_v0400.dll| 4.7.2672.0| 827,096| 19-Jul-2018| 22:47 \nservicemonikersupport.dll| 4.7.3130.0| 29,384| 06-Jun-2018| 06:16 \nsos.dll| 4.7.3133.0| 744,952| 25-Jul-2018| 02:50 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nwebengine4.dll| 4.7.2623.0| 550,032| 30-Nov-2017| 04:16 \nwebengine.dll| 4.7.2623.0| 24,712| 30-Nov-2017| 04:16 \nwminet_utils.dll| 4.7.2102.0| 136,368| 06-Jun-2017| 23:17 \nworkflowservicehostperformancecounters.dll| 4.7.3130.0| 89,384| 06-Jun-2018| 06:16 \nwpfgfx_v0400.dll| 4.7.2672.0| 1,345,160| 19-Jul-2018| 22:47 \npresentationcore.dll| 4.7.2672.0| 3,635,024| 19-Jul-2018| 22:47 \nsystem.data.dll| 4.7.2623.0| 3,397,272| 30-Nov-2017| 04:16 \nsystem.transactions.dll| 4.6.1099.0| 303,824| 27-Mar-2017| 03:33 \nsystem.web.dll| 4.7.2623.0| 5,409,936| 30-Nov-2017| 04:16 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4344144)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344144", "href": "https://support.microsoft.com/en-us/help/4344144", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:00", "description": "None\n## Summary\n\nThis update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections where content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows Server 2012, see the following article in the Microsoft Knowledge Base:[4345591](<https://support.microsoft.com/help/4345591>) Security and Quality Rollup updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1 and 4.7.2 for Windows Server 2012 (KB 4345591)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345591** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces previously released updates [KB 4340557](<https://support.microsoft.com/help/4340557>) and [KB 4291495](<https://support.microsoft.com/help/4291495>). \n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8-RT-KB4344148-x64.msu| 75F9FD1B79CE8E2121004DA317E308B63223F1E0| E3E381ECFF02E4B1795770FF4A6677ECCF10E04EC789CE9F9E8648751644A6C0 \nWindows8-RT-KB4344148-x86.msu| 961F603CC2A7A2DEF16C2111217929DBFE5441AF| B048A02C81A5268E40FF20785688D18C86CDC134F6F70CB3E9BC5D70000C0D68 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nvbc.exe.config| | 182| 04-Jun-2015| 23:03 \nwebengine4.dll| 4.0.30319.36430| 509,584| 12-Dec-2017| 19:05 \nwebengine.dll| 4.0.30319.36430| 24,720| 12-Dec-2017| 19:05 \nwminet_utils.dll| 4.0.30319.36403| 126,128| 09-Jun-2017| 13:10 \nworkflowservicehostperformancecounters.dll| 4.0.30319.36450| 75,536| 27-Jul-2018| 07:23 \nwpfgfx_v0400.dll| 4.0.30319.36393| 1,648,304| 06-Apr-2017| 20:26 \npresentationcore.dll| 4.0.30319.36393| 3,226,976| 06-Apr-2017| 20:26 \nsystem.data.dll| 4.0.30319.36393| 3,209,392| 06-Apr-2017| 20:26 \nsystem.printing.dll| 4.0.30319.36366| 343,384| 11-Aug-2016| 13:22 \nsystem.transactions.dll| 4.0.30319.36366| 289,488| 11-Aug-2016| 13:22 \nsystem.web.dll| 4.0.30319.36430| 5,464,208| 12-Dec-2017| 19:05 \nmicrosoft.build.tasks.v4.0.dll| 4.0.30319.36366| 1,191,144| 11-Aug-2016| 13:22 \nmicrosoft.build.dll| 4.0.30319.36366| 1,448,128| 11-Aug-2016| 13:22 \npresentationframework.aero2.dll| 4.0.30319.36366| 256,912| 11-Aug-2016| 13:22 \npresentationframework.aerolite.dll| 4.0.30319.36366| 177,560| 11-Aug-2016| 13:22 \npresentationframework.dll| 4.0.30319.36393| 6,221,680| 06-Apr-2017| 20:26 \nreachframework.dll| 4.0.30319.36366| 595,280| 11-Aug-2016| 13:22 \nsmdiagnostics.dll| 4.0.30319.36450| 73,328| 08-Jun-2018| 16:05 \nsystem.activities.core.presentation.dll| 4.0.30319.36366| 718,256| 11-Aug-2016| 13:22 \nsystem.activities.presentation.dll| 4.0.30319.36366| 2,140,576| 11-Aug-2016| 13:22 \nsystem.activities.dll| 4.0.30319.36450| 1,582,704| 08-Jun-2018| 16:05 \nsystem.addin.dll| 4.0.30319.36366| 163,504| 11-Aug-2016| 13:22 \nsystem.componentmodel.composition.dll| 4.0.30319.36366| 312,096| 11-Aug-2016| 13:22 \nsystem.configuration.dll| 4.0.30319.36366| 402,640| 11-Aug-2016| 13:22 \nsystem.core.dll| 4.0.30319.36393| 1,271,968| 06-Apr-2017| 20:26 \nsystem.data.entity.dll| 4.0.30319.36366| 4,099,272| 11-Aug-2016| 13:22 \nsystem.data.linq.dll| 4.0.30319.36366| 698,568| 11-Aug-2016| 13:22 \nsystem.data.sqlxml.dll| 4.0.30319.36427| 752,320| 01-Dec-2017| 13:05 \nsystem.deployment.dll| 4.0.30319.36366| 853,696| 11-Aug-2016| 13:22 \nsystem.design.dll| 4.0.30319.36366| 5,056,176| 11-Aug-2016| 13:22 \nsystem.directoryservices.accountmanagement.dll| 4.0.30319.36366| 297,776| 27-Jul-2018| 07:23 \nsystem.directoryservices.protocols.dll| 4.0.30319.36366| 203,048| 11-Aug-2016| 13:22 \nsystem.directoryservices.dll| 4.0.30319.36366| 425,704| 11-Aug-2016| 13:22 \nsystem.drawing.design.dll| 4.0.30319.36366| 113,880| 11-Aug-2016| 13:22 \nsystem.drawing.dll| 4.0.30319.36366| 598,704| 11-Aug-2016| 13:22 \nsystem.identitymodel.services.dll| 4.0.30319.36450| 199,912| 08-Jun-2018| 16:05 \nsystem.identitymodel.dll| 4.0.30319.36450| 1,093,784| 08-Jun-2018| 16:05 \nsystem.io.compression.dll| 4.0.30319.36366| 71,904| 11-Aug-2016| 13:22 \nsystem.management.dll| 4.0.30319.36403| 417,472| 09-Jun-2017| 13:10 \nsystem.messaging.dll| 4.0.30319.36366| 275,640| 11-Aug-2016| 13:22 \nsystem.net.dll| 4.0.30319.36366| 259,736| 11-Aug-2016| 13:22 \nsystem.numerics.dll| 4.0.30319.36366| 86,192| 11-Aug-2016| 13:22 \nsystem.runtime.caching.dll| 4.0.30319.36393| 109,272| 06-Apr-2017| 20:26 \nsystem.runtime.remoting.dll| 4.0.30319.36415| 348,904| 31-Aug-2017| 13:08 \nsystem.runtime.serialization.dll| 4.0.30319.36450| 1,060,008| 08-Jun-2018| 16:05 \nsystem.runtime.windowsruntime.dll| 4.0.30319.36366| 152,328| 11-Aug-2016| 13:22 \nsystem.runtime.dll| 4.0.30319.36366| 36,536| 11-Aug-2016| 13:22 \nsystem.security.dll| 4.0.30319.36440| 301,648| 27-Mar-2018| 17:37 \nsystem.servicemodel.activation.dll| 4.0.30319.36366| 204,184| 11-Aug-2016| 13:22 \nsystem.servicemodel.channels.dll| 4.0.30319.36450| 159,624| 08-Jun-2018| 16:05 \nsystem.servicemodel.discovery.dll| 4.0.30319.36450| 312,712| 08-Jun-2018| 16:05 \nsystem.servicemodel.internals.dll| 4.0.30319.36450| 254,648| 08-Jun-2018| 16:05 \nsystem.servicemodel.routing.dll| 4.0.30319.36366| 132,496| 11-Aug-2016| 13:22 \nsystem.servicemodel.washosting.dll| 4.0.30319.36450| 39,664| 08-Jun-2018| 16:05 \nsystem.servicemodel.web.dll| 4.0.30319.36366| 332,520| 11-Aug-2016| 13:22 \nsystem.servicemodel.dll| 4.0.30319.36450| 6,386,832| 08-Jun-2018| 16:05 \nsystem.serviceprocess.dll| 4.0.30319.36366| 134,872| 11-Aug-2016| 13:22 \nsystem.threading.timer.dll| 4.0.30319.36366| 29,400| 11-Aug-2016| 13:22 \nsystem.web.applicationservices.dll| 4.0.30319.36430| 71,424| 12-Dec-2017| 19:05 \nsystem.web.extensions.dll| 4.0.30319.36430| 1,859,280| 12-Dec-2017| 19:05 \nsystem.web.mobile.dll| 4.0.30319.36366| 839,880| 11-Aug-2016| 13:22 \nsystem.web.services.dll| 4.0.30319.36366| 858,312| 11-Aug-2016| 13:22 \nsystem.windows.controls.ribbon.dll| 4.0.30319.36393| 751,512| 06-Apr-2017| 20:26 \nsystem.windows.forms.dll| 4.0.30319.36366| 4,859,608| 11-Aug-2016| 13:22 \nsystem.workflow.activities.dll| 4.0.30319.36450| 1,068,416| 08-Jun-2018| 16:05 \nsystem.workflow.componentmodel.dll| 4.0.30319.36450| 1,560,464| 08-Jun-2018| 16:05 \nsystem.workflow.runtime.dll| 4.0.30319.36450| 503,664| 08-Jun-2018| 16:05 \nsystem.xaml.dll| 4.0.30319.36393| 640,672| 06-Apr-2017| 20:26 \nsystem.xml.dll| 4.0.30319.36427| 2,705,040| 01-Dec-2017| 13:05 \nsystem.dll| 4.0.30319.36455| 3,488,792| 13-Jul-2018| 02:54 \nwindowsbase.dll| 4.0.30319.36393| 1,241,928| 06-Apr-2017| 20:26 \nwindowsformsintegration.dll| 4.0.30319.36366| 102,784| 11-Aug-2016| 13:22 \nxamlbuildtask.dll| 4.0.30319.36366| 133,968| 11-Aug-2016| 13:22 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 47,076| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 40,566| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 67,808| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 61,718| 21-Nov-2017| 07:23 \naspnet_perf.h| | 7,177| 02-Jun-2012| 14:34 \naspnet_perf2.ini| | 995,534| 02-Jun-2012| 14:34 \naspnet_perf2_d.ini| | 31| 02-Jun-2012| 14:34 \naspnet_state_perf.h| | 318| 02-Jun-2012| 14:34 \naspnet_state_perf.ini| | 42,996| 02-Jun-2012| 14:34 \naspnet_state_perf_d.ini| | 36| 02-Jun-2012| 14:34 \naspnet_counters.dll| 4.0.30319.36366| 28,352| 11-Aug-2016| 13:22 \naspnet_filter.dll| 4.0.30319.36366| 34,488| 11-Aug-2016| 13:22 \naspnet_isapi.dll| 4.0.30319.36366| 24,752| 11-Aug-2016| 13:22 \naspnet_perf.dll| 4.0.30319.36430| 41,616| 12-Dec-2017| 19:05 \naspnet_rc.dll| 4.0.30319.36366| 90,280| 11-Aug-2016| 13:22 \naspnet_regiis.exe| 4.0.30319.36366| 41,136| 11-Aug-2016| 13:22 \naspnet_state.exe| 4.0.30319.36366| 45,744| 11-Aug-2016| 13:22 \naspnet_state_perf.h| | 318| 15-Nov-2017| 00:50 \naspnet_state_perf.ini| | 42,996| 15-Nov-2017| 00:50 \naspnet_wp.exe| 4.0.30319.36430| 43,104| 12-Dec-2017| 19:05 \nblackberry.browser| | 2,389| 04-Jun-2015| 23:02 \nchrome.browser| | 2,107| 04-Jun-2015| 23:02 \ndefault.browser| | 11,568| 04-Jun-2015| 23:02 \nfirefox.browser| | 2,336| 04-Jun-2015| 23:02 \ngateway.browser| | 5,630| 04-Jun-2015| 23:02 \ngeneric.browser| | 5,569| 04-Jun-2015| 23:02 \nie.browser| | 5,166| 04-Jun-2015| 23:02 \niemobile.browser| | 4,045| 04-Jun-2015| 23:02 \niphone.browser| | 1,759| 04-Jun-2015| 23:02 \nopera.browser| | 5,248| 04-Jun-2015| 23:02 \nsafari.browser| | 3,560| 04-Jun-2015| 23:02 \nucbrowser.browser| | 1,725| 04-Jun-2015| 23:02 \nclr-etw.man| | 303,549| 28-Dec-2016| 04:30 \nclretwrc.dll| 4.0.30319.36366| 228,008| 28-Dec-2016| 04:30 \nclrjit.dll| 4.0.30319.36460| 510,464| 24-Jul-2018| 15:10 \nclr.dll| 4.0.30319.36460| 6,939,640| 24-Jul-2018| 15:10 \ncorperfmonext.dll| 4.0.30319.36366| 127,672| 11-Aug-2016| 13:22 \ncsc.rsp| | 1,329| 04-Jun-2015| 23:02 \ncsc.exe| 4.0.30319.36366| 1,853,072| 11-Aug-2016| 13:22 \ncsc.exe.config| | 182| 04-Jun-2015| 23:02 \nculture.dll| 4.0.30319.36366| 54,432| 22-Aug-2016| 13:09 \nlocale.nlp| | 419,632| 22-Aug-2015| 13:09 \ndfdll.dll| 4.0.30319.36366| 141,976| 11-Aug-2016| 13:22 \ninstallpersistsqlstate.sql| | 54,647| 28-Dec-2016| 04:30 \ninstallsqlstatetemplate.sql| | 56,233| 28-Dec-2016| 04:30 \ninstallsqlstate.sql| | 54,427| 28-Dec-2016| 04:30 \nmicrosoft.common.overridetasks| | 6,297| 04-Jun-2015| 23:02 \nmicrosoft.data.entity.targets| | 6,501| 04-Jun-2015| 23:02 \nmicrosoft.workflowbuildextensions.targets| | 7,537| 27-Jul-2018| 07:23 \nmicrosoft.xaml.targets| | 19,848| 04-Jun-2015| 23:02 \nmmcaspext.dll| 4.0.30319.36366| 107,176| 11-Aug-2016| 13:22 \nmicrosoft.common.targets| | 262,547| 04-Jun-2015| 23:02 \nmicrosoft.csharp.targets| | 23,618| 04-Jun-2015| 23:02 \nmicrosoft.netframework.props| | 11,957| 04-Jun-2015| 23:02 \nmicrosoft.netframework.targets| | 8,183| 04-Jun-2015| 23:02 \nmicrosoft.visualbasic.targets| | 23,329| 04-Jun-2015| 23:02 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 24-Jul-2018| 15:10 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 24-Jul-2018| 15:10 \nmscoreei.dll| 4.0.30319.36366| 516,256| 11-Aug-2016| 13:22 \nmscorrc.dll| 4.0.30319.36366| 395,936| 11-Aug-2016| 13:22 \nmscorsvc.dll| 4.0.30319.36366| 414,880| 11-Aug-2016| 13:22 \nmscorsvw.exe| 4.0.30319.36366| 103,600| 22-Aug-2016| 13:09 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 24-Jul-2018| 15:10 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 24-Jul-2018| 15:10 \nngen.exe| 4.0.30319.36366| 140,944| 22-Aug-2016| 13:09 \npenimc.dll| 4.0.30319.36393| 81,560| 06-Apr-2017| 20:26 \npeverify.dll| 4.0.30319.36460| 163,968| 24-Jul-2018| 15:10 \npresentationhost_v0400.dll| 4.0.30319.36393| 186,072| 06-Apr-2017| 20:26 \npresentationnative_v0400.dll| 4.0.30319.36393| 790,240| 06-Apr-2017| 20:26 \nservicemonikersupport.dll| 4.0.30319.36450| 28,360| 08-Jun-2018| 16:05 \nsos.dll| 4.0.30319.36460| 762,472| 24-Jul-2018| 15:10 \nsystem.addin.dll| 4.0.30319.36366| 163,504| 11-Aug-2016| 13:22 \nsystem.core.dll| 4.0.30319.36393| 1,271,968| 06-Apr-2017| 20:26 \nsystem.data.entity.dll| 4.0.30319.36366| 4,099,272| 11-Aug-2016| 13:22 \nsystem.data.linq.dll| 4.0.30319.36366| 698,568| 11-Aug-2016| 13:22 \nsystem.net.dll| 4.0.30319.36366| 259,736| 11-Aug-2016| 13:22 \nsystem.web.extensions.dll| 4.0.30319.36430| 1,859,280| 12-Dec-2017| 19:05 \nvbc.rsp| | 1,467| 04-Jun-2015| 23:03 \nvbc.exe| 12.0.52366.36366| 2,459,280| 11-Aug-2016| 13:22 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.0.30319.36460| 5,219,968| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 47,076| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 40,566| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 67,808| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 61,718| 21-Nov-2017| 07:23 \naspnet_perf.h| | 7,177| 02-Jun-2012| 14:32 \naspnet_perf2.ini| | 995,534| 02-Jun-2012| 14:32 \naspnet_perf2_d.ini| | 31| 02-Jun-2012| 14:33 \naspnet_state_perf.h| | 318| 02-Jun-2012| 14:33 \naspnet_state_perf.ini| | 42,996| 02-Jun-2012| 14:33 \naspnet_state_perf_d.ini| | 36| 02-Jun-2012| 14:33 \naspnet_counters.dll| 4.0.30319.36366| 29,888| 11-Aug-2016| 13:22 \naspnet_filter.dll| 4.0.30319.36366| 37,560| 11-Aug-2016| 13:22 \naspnet_isapi.dll| 4.0.30319.36366| 25,776| 11-Aug-2016| 13:22 \naspnet_perf.dll| 4.0.30319.36430| 45,208| 12-Dec-2017| 19:06 \naspnet_rc.dll| 4.0.30319.36366| 90,280| 11-Aug-2016| 13:22 \naspnet_regiis.exe| 4.0.30319.36366| 43,704| 11-Aug-2016| 13:22 \naspnet_state.exe| 4.0.30319.36366| 50,864| 11-Aug-2016| 13:22 \naspnet_state_perf.h| | 318| 15-Nov-2017| 00:49 \naspnet_state_perf.ini| | 42,996| 15-Nov-2017| 00:49 \naspnet_wp.exe| 4.0.30319.36430| 47,712| 12-Dec-2017| 19:06 \nblackberry.browser| | 2,389| 04-Jun-2015| 22:53 \nchrome.browser| | 2,107| 04-Jun-2015| 22:53 \ndefault.browser| | 11,568| 04-Jun-2015| 22:53 \nfirefox.browser| | 2,336| 04-Jun-2015| 22:53 \ngateway.browser| | 5,630| 04-Jun-2015| 22:53 \ngeneric.browser| | 5,569| 04-Jun-2015| 22:53 \nie.browser| | 5,166| 04-Jun-2015| 22:53 \niemobile.browser| | 4,045| 04-Jun-2015| 22:53 \niphone.browser| | 1,759| 04-Jun-2015| 22:53 \nopera.browser| | 5,248| 04-Jun-2015| 22:53 \nsafari.browser| | 3,560| 04-Jun-2015| 22:53 \nucbrowser.browser| | 1,725| 04-Jun-2015| 22:53 \nclr-etw.man| | 303,557| 04-Jun-2015| 22:53 \nclretwrc.dll| 4.0.30319.36366| 228,008| 11-Aug-2016| 13:22 \nclrjit.dll| 4.0.30319.36460| 1,234,552| 24-Jul-2018| 15:10 \nclr.dll| 4.0.30319.36460| 10,070,120| 24-Jul-2018| 15:10 \ncorperfmonext.dll| 4.0.30319.36366| 153,784| 11-Aug-2016| 13:22 \ncsc.rsp| | 1,329| 04-Jun-2015| 22:53 \ncsc.exe| 4.0.30319.36366| 2,637,456| 11-Aug-2016| 13:22 \ncsc.exe.config| | 182| 04-Jun-2015| 22:53 \nculture.dll| 4.0.30319.36366| 63,648| 22-Aug-2016| 13:10 \nlocale.nlp| | 419,632| 22-Aug-2015| 13:09 \ndfdll.dll| 4.0.30319.36366| 165,528| 11-Aug-2016| 13:22 \ninstallpersistsqlstate.sql| | 54,647| 04-Jun-2015| 22:53 \ninstallsqlstatetemplate.sql| | 56,233| 04-Jun-2015| 22:53 \ninstallsqlstate.sql| | 54,427| 04-Jun-2015| 22:53 \nmicrosoft.build.tasks.v4.0.dll| 4.0.30319.36366| 1,191,144| 11-Aug-2016| 13:22 \nmicrosoft.build.dll| 4.0.30319.36366| 1,448,128| 11-Aug-2016| 13:22 \nmicrosoft.common.overridetasks| | 6,297| 04-Jun-2015| 22:53 \nmicrosoft.data.entity.targets| | 6,501| 04-Jun-2015| 22:53 \nmicrosoft.workflowbuildextensions.targets| | 7,537| 27-Jul-2018| 07:24 \nmicrosoft.xaml.targets| | 19,848| 04-Jun-2015| 22:53 \nmmcaspext.dll| 4.0.30319.36366| 113,320| 11-Aug-2016| 13:22 \nmicrosoft.common.targets| | 262,547| 04-Jun-2015| 22:53 \nmicrosoft.csharp.targets| | 23,618| 04-Jun-2015| 22:53 \nmicrosoft.netframework.props| | 11,957| 04-Jun-2015| 22:53 \nmicrosoft.netframework.targets| | 8,183| 04-Jun-2015| 22:53 \nmicrosoft.visualbasic.targets| | 23,329| 04-Jun-2015| 22:53 \nmscordacwks.dll| 4.0.30319.36460| 1,731,208| 24-Jul-2018| 15:10 \nmscordbi.dll| 4.0.30319.36460| 1,533,568| 24-Jul-2018| 15:10 \nmscoreei.dll| 4.0.30319.36366| 636,064| 11-Aug-2016| 13:22 \nmscorrc.dll| 4.0.30319.36366| 395,936| 11-Aug-2016| 13:22 \nmscorsvc.dll| 4.0.30319.36366| 523,424| 11-Aug-2016| 13:22 \nmscorsvw.exe| 4.0.30319.36366| 124,088| 22-Aug-2016| 13:10 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 678,584| 24-Jul-2018| 15:10 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 869,536| 24-Jul-2018| 15:10 \nngen.exe| 4.0.30319.36366| 171,152| 22-Aug-2016| 13:10 \npenimc.dll| 4.0.30319.36393| 94,872| 06-Apr-2017| 20:26 \npeverify.dll| 4.0.30319.36460| 225,920| 24-Jul-2018| 15:10 \npresentationframework.aero2.dll| 4.0.30319.36366| 256,912| 11-Aug-2016| 13:22 \npresentationframework.aerolite.dll| 4.0.30319.36366| 177,560| 11-Aug-2016| 13:22 \npresentationframework.dll| 4.0.30319.36393| 6,221,680| 06-Apr-2017| 20:26 \npresentationhost_v0400.dll| 4.0.30319.36393| 232,152| 06-Apr-2017| 20:26 \npresentationnative_v0400.dll| 4.0.30319.36393| 1,077,984| 06-Apr-2017| 20:26 \nreachframework.dll| 4.0.30319.36366| 595,280| 11-Aug-2016| 13:22 \nservicemonikersupport.dll| 4.0.30319.36450| 28,872| 08-Jun-2018| 16:05 \nsmdiagnostics.dll| 4.0.30319.36450| 73,328| 08-Jun-2018| 16:05 \nsos.dll| 4.0.30319.36460| 822,888| 24-Jul-2018| 15:10 \nsystem.activities.core.presentation.dll| 4.0.30319.36366| 718,256| 27-Jul-2018| 07:24 \nsystem.activities.presentation.dll| 4.0.30319.36366| 2,140,576| 11-Aug-2016| 13:22 \nsystem.activities.dll| 4.0.30319.36450| 1,582,704| 08-Jun-2018| 16:05 \nsystem.addin.dll| 4.0.30319.36366| 163,504| 11-Aug-2016| 13:22 \nsystem.componentmodel.composition.dll| 4.0.30319.36366| 312,096| 27-Jul-2018| 07:24 \nsystem.configuration.dll| 4.0.30319.36366| 402,640| 11-Aug-2016| 13:22 \nsystem.core.dll| 4.0.30319.36393| 1,271,968| 06-Apr-2017| 20:26 \nsystem.data.entity.dll| 4.0.30319.36366| 4,099,272| 11-Aug-2016| 13:22 \nsystem.data.linq.dll| 4.0.30319.36366| 698,568| 11-Aug-2016| 13:22 \nsystem.data.sqlxml.dll| 4.0.30319.36427| 752,320| 01-Dec-2017| 13:13 \nsystem.deployment.dll| 4.0.30319.36366| 853,696| 11-Aug-2016| 13:22 \nsystem.design.dll| 4.0.30319.36366| 5,056,176| 11-Aug-2016| 13:22 \nsystem.directoryservices.accountmanagement.dll| 4.0.30319.36366| 297,776| 27-Jul-2018| 07:24 \nsystem.directoryservices.protocols.dll| 4.0.30319.36366| 203,048| 27-Jul-2018| 07:24 \nsystem.directoryservices.dll| 4.0.30319.36366| 425,704| 11-Aug-2016| 13:22 \nsystem.drawing.design.dll| 4.0.30319.36366| 113,880| 11-Aug-2016| 13:22 \nsystem.drawing.dll| 4.0.30319.36366| 598,704| 11-Aug-2016| 13:22 \nsystem.identitymodel.services.dll| 4.0.30319.36450| 199,912| 08-Jun-2018| 16:05 \nsystem.identitymodel.dll| 4.0.30319.36450| 1,093,784| 08-Jun-2018| 16:05 \nsystem.io.compression.dll| 4.0.30319.36366| 71,904| 11-Aug-2016| 13:22 \nsystem.management.dll| 4.0.30319.36403| 417,472| 09-Jun-2017| 13:10 \nsystem.messaging.dll| 4.0.30319.36366| 275,640| 11-Aug-2016| 13:22 \nsystem.net.dll| 4.0.30319.36366| 259,736| 11-Aug-2016| 13:22 \nsystem.numerics.dll| 4.0.30319.36366| 86,192| 11-Aug-2016| 13:22 \nsystem.runtime.caching.dll| 4.0.30319.36393| 109,272| 06-Apr-2017| 20:26 \nsystem.runtime.remoting.dll| 4.0.30319.36415| 348,904| 31-Aug-2017| 13:09 \nsystem.runtime.serialization.dll| 4.0.30319.36450| 1,060,008| 08-Jun-2018| 16:05 \nsystem.runtime.windowsruntime.dll| 4.0.30319.36366| 152,328| 11-Aug-2016| 13:22 \nsystem.runtime.dll| 4.0.30319.36366| 36,536| 11-Aug-2016| 13:22 \nsystem.security.dll| 4.0.30319.36440| 301,648| 27-Mar-2018| 17:37 \nsystem.servicemodel.activation.dll| 4.0.30319.36366| 204,184| 11-Aug-2016| 13:22 \nsystem.servicemodel.channels.dll| 4.0.30319.36450| 159,624| 08-Jun-2018| 16:05 \nsystem.servicemodel.discovery.dll| 4.0.30319.36450| 312,712| 08-Jun-2018| 16:05 \nsystem.servicemodel.internals.dll| 4.0.30319.36450| 254,648| 08-Jun-2018| 16:05 \nsystem.servicemodel.routing.dll| 4.0.30319.36366| 132,496| 11-Aug-2016| 13:22 \nsystem.servicemodel.washosting.dll| 4.0.30319.36450| 39,664| 08-Jun-2018| 16:05 \nsystem.servicemodel.web.dll| 4.0.30319.36366| 332,520| 11-Aug-2016| 13:22 \nsystem.servicemodel.dll| 4.0.30319.36450| 6,386,832| 08-Jun-2018| 16:05 \nsystem.serviceprocess.dll| 4.0.30319.36366| 134,872| 11-Aug-2016| 13:22 \nsystem.threading.timer.dll| 4.0.30319.36366| 29,400| 11-Aug-2016| 13:22 \nsystem.web.applicationservices.dll| 4.0.30319.36430| 71,424| 12-Dec-2017| 19:06 \nsystem.web.extensions.dll| 4.0.30319.36430| 1,859,280| 12-Dec-2017| 19:06 \nsystem.web.mobile.dll| 4.0.30319.36366| 839,880| 11-Aug-2016| 13:22 \nsystem.web.services.dll| 4.0.30319.36366| 858,312| 11-Aug-2016| 13:22 \nsystem.windows.controls.ribbon.dll| 4.0.30319.36393| 751,512| 06-Apr-2017| 20:26 \nsystem.windows.forms.dll| 4.0.30319.36366| 4,859,608| 11-Aug-2016| 13:22 \nsystem.workflow.activities.dll| 4.0.30319.36450| 1,068,416| 08-Jun-2018| 16:05 \nsystem.workflow.componentmodel.dll| 4.0.30319.36450| 1,560,464| 08-Jun-2018| 16:05 \nsystem.workflow.runtime.dll| 4.0.30319.36450| 503,664| 08-Jun-2018| 16:05 \nsystem.xaml.dll| 4.0.30319.36393| 640,672| 06-Apr-2017| 20:26 \nsystem.xml.dll| 4.0.30319.36427| 2,705,040| 01-Dec-2017| 13:13 \nsystem.dll| 4.0.30319.36455| 3,488,792| 13-Jul-2018| 02:55 \nvbc.rsp| | 1,467| 04-Jun-2015| 22:54 \nvbc.exe| 12.0.52366.36366| 3,546,256| 11-Aug-2016| 13:22 \nvbc.exe.config| | 182| 04-Jun-2015| 22:54 \nwebengine4.dll| 4.0.30319.36430| 621,200| 12-Dec-2017| 19:06 \nwebengine.dll| 4.0.30319.36430| 26,768| 12-Dec-2017| 19:06 \nwindowsbase.dll| 4.0.30319.36393| 1,241,928| 06-Apr-2017| 20:26 \nwindowsformsintegration.dll| 4.0.30319.36366| 102,784| 11-Aug-2016| 13:22 \nwminet_utils.dll| 4.0.30319.36403| 174,256| 09-Jun-2017| 13:10 \nworkflowservicehostperformancecounters.dll| 4.0.30319.36450| 84,776| 27-Jul-2018| 07:24 \nwpfgfx_v0400.dll| 4.0.30319.36393| 2,108,592| 06-Apr-2017| 20:26 \nxamlbuildtask.dll| 4.0.30319.36366| 133,968| 11-Aug-2016| 13:22 \npresentationcore.dll| 4.0.30319.36393| 3,210,944| 06-Apr-2017| 20:26 \nsystem.data.dll| 4.0.30319.36393| 3,238,064| 06-Apr-2017| 20:26 \nsystem.printing.dll| 4.0.30319.36366| 342,720| 11-Aug-2016| 13:22 \nsystem.transactions.dll| 4.0.30319.36366| 292,560| 11-Aug-2016| 13:22 \nsystem.web.dll| 4.0.30319.36430| 5,458,064| 12-Dec-2017| 19:06 \nmicrosoft.build.tasks.v4.0.dll| 4.0.30319.36366| 1,191,144| 11-Aug-2016| 13:22 \nmicrosoft.build.dll| 4.0.30319.36366| 1,448,128| 11-Aug-2016| 13:22 \npresentationframework.aero2.dll| 4.0.30319.36366| 256,912| 11-Aug-2016| 13:22 \npresentationframework.aerolite.dll| 4.0.30319.36366| 177,560| 11-Aug-2016| 13:22 \npresentationframework.dll| 4.0.30319.36393| 6,221,680| 06-Apr-2017| 20:26 \nreachframework.dll| 4.0.30319.36366| 595,280| 11-Aug-2016| 13:22 \nsmdiagnostics.dll| 4.0.30319.36450| 73,328| 08-Jun-2018| 16:05 \nsystem.activities.core.presentation.dll| 4.0.30319.36366| 718,256| 11-Aug-2016| 13:22 \nsystem.activities.presentation.dll| 4.0.30319.36366| 2,140,576| 11-Aug-2016| 13:22 \nsystem.activities.dll| 4.0.30319.36450| 1,582,704| 08-Jun-2018| 16:05 \nsystem.addin.dll| 4.0.30319.36366| 163,504| 11-Aug-2016| 13:22 \nsystem.componentmodel.composition.dll| 4.0.30319.36366| 312,096| 11-Aug-2016| 13:22 \nsystem.configuration.dll| 4.0.30319.36366| 402,640| 11-Aug-2016| 13:22 \nsystem.core.dll| 4.0.30319.36393| 1,271,968| 06-Apr-2017| 20:26 \nsystem.data.entity.dll| 4.0.30319.36366| 4,099,272| 11-Aug-2016| 13:22 \nsystem.data.linq.dll| 4.0.30319.36366| 698,568| 11-Aug-2016| 13:22 \nsystem.data.sqlxml.dll| 4.0.30319.36427| 752,320| 01-Dec-2017| 13:05 \nsystem.deployment.dll| 4.0.30319.36366| 853,696| 11-Aug-2016| 13:22 \nsystem.design.dll| 4.0.30319.36366| 5,056,176| 11-Aug-2016| 13:22 \nsystem.directoryservices.accountmanagement.dll| 4.0.30319.36366| 297,776| 27-Jul-2018| 07:24 \nsystem.directoryservices.protocols.dll| 4.0.30319.36366| 203,048| 11-Aug-2016| 13:22 \nsystem.directoryservices.dll| 4.0.30319.36366| 425,704| 11-Aug-2016| 13:22 \nsystem.drawing.design.dll| 4.0.30319.36366| 113,880| 11-Aug-2016| 13:22 \nsystem.drawing.dll| 4.0.30319.36366| 598,704| 11-Aug-2016| 13:22 \nsystem.identitymodel.services.dll| 4.0.30319.36450| 199,912| 08-Jun-2018| 16:05 \nsystem.identitymodel.dll| 4.0.30319.36450| 1,093,784| 08-Jun-2018| 16:05 \nsystem.io.compression.dll| 4.0.30319.36366| 71,904| 11-Aug-2016| 13:22 \nsystem.management.dll| 4.0.30319.36403| 417,472| 09-Jun-2017| 13:10 \nsystem.messaging.dll| 4.0.30319.36366| 275,640| 11-Aug-2016| 13:22 \nsystem.net.dll| 4.0.30319.36366| 259,736| 11-Aug-2016| 13:22 \nsystem.numerics.dll| 4.0.30319.36366| 86,192| 11-Aug-2016| 13:22 \nsystem.runtime.caching.dll| 4.0.30319.36393| 109,272| 06-Apr-2017| 20:26 \nsystem.runtime.remoting.dll| 4.0.30319.36415| 348,904| 31-Aug-2017| 13:08 \nsystem.runtime.serialization.dll| 4.0.30319.36450| 1,060,008| 08-Jun-2018| 16:05 \nsystem.runtime.windowsruntime.dll| 4.0.30319.36366| 152,328| 11-Aug-2016| 13:22 \nsystem.runtime.dll| 4.0.30319.36366| 36,536| 11-Aug-2016| 13:22 \nsystem.security.dll| 4.0.30319.36440| 301,648| 27-Mar-2018| 17:37 \nsystem.servicemodel.activation.dll| 4.0.30319.36366| 204,184| 11-Aug-2016| 13:22 \nsystem.servicemodel.channels.dll| 4.0.30319.36450| 159,624| 08-Jun-2018| 16:05 \nsystem.servicemodel.discovery.dll| 4.0.30319.36450| 312,712| 08-Jun-2018| 16:05 \nsystem.servicemodel.internals.dll| 4.0.30319.36450| 254,648| 08-Jun-2018| 16:05 \nsystem.servicemodel.routing.dll| 4.0.30319.36366| 132,496| 11-Aug-2016| 13:22 \nsystem.servicemodel.washosting.dll| 4.0.30319.36450| 39,664| 08-Jun-2018| 16:05 \nsystem.servicemodel.web.dll| 4.0.30319.36366| 332,520| 11-Aug-2016| 13:22 \nsystem.servicemodel.dll| 4.0.30319.36450| 6,386,832| 08-Jun-2018| 16:05 \nsystem.serviceprocess.dll| 4.0.30319.36366| 134,872| 11-Aug-2016| 13:22 \nsystem.threading.timer.dll| 4.0.30319.36366| 29,400| 11-Aug-2016| 13:22 \nsystem.web.applicationservices.dll| 4.0.30319.36430| 71,424| 12-Dec-2017| 19:05 \nsystem.web.extensions.dll| 4.0.30319.36430| 1,859,280| 12-Dec-2017| 19:05 \nsystem.web.mobile.dll| 4.0.30319.36366| 839,880| 11-Aug-2016| 13:22 \nsystem.web.services.dll| 4.0.30319.36366| 858,312| 11-Aug-2016| 13:22 \nsystem.windows.controls.ribbon.dll| 4.0.30319.36393| 751,512| 06-Apr-2017| 20:26 \nsystem.windows.forms.dll| 4.0.30319.36366| 4,859,608| 11-Aug-2016| 13:22 \nsystem.workflow.activities.dll| 4.0.30319.36450| 1,068,416| 08-Jun-2018| 16:05 \nsystem.workflow.componentmodel.dll| 4.0.30319.36450| 1,560,464| 08-Jun-2018| 16:05 \nsystem.workflow.runtime.dll| 4.0.30319.36450| 503,664| 08-Jun-2018| 16:05 \nsystem.xaml.dll| 4.0.30319.36393| 640,672| 06-Apr-2017| 20:26 \nsystem.xml.dll| 4.0.30319.36427| 2,705,040| 01-Dec-2017| 13:05 \nsystem.dll| 4.0.30319.36455| 3,488,792| 13-Jul-2018| 02:54 \nwindowsbase.dll| 4.0.30319.36393| 1,241,928| 06-Apr-2017| 20:26 \nwindowsformsintegration.dll| 4.0.30319.36366| 102,784| 11-Aug-2016| 13:22 \nxamlbuildtask.dll| 4.0.30319.36366| 133,968| 11-Aug-2016| 13:22 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 47,076| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 40,566| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 67,808| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 61,718| 21-Nov-2017| 07:23 \naspnet_counters.dll| 4.0.30319.36366| 28,352| 11-Aug-2016| 13:22 \naspnet_filter.dll| 4.0.30319.36366| 34,488| 11-Aug-2016| 13:22 \naspnet_isapi.dll| 4.0.30319.36366| 24,752| 11-Aug-2016| 13:22 \naspnet_perf.dll| 4.0.30319.36430| 41,616| 12-Dec-2017| 19:05 \naspnet_rc.dll| 4.0.30319.36366| 90,280| 11-Aug-2016| 13:22 \naspnet_regiis.exe| 4.0.30319.36366| 41,136| 11-Aug-2016| 13:22 \naspnet_state.exe| 4.0.30319.36366| 45,744| 11-Aug-2016| 13:22 \naspnet_state_perf.h| | 318| 15-Nov-2017| 00:50 \naspnet_state_perf.ini| | 42,996| 15-Nov-2017| 00:50 \naspnet_wp.exe| 4.0.30319.36430| 43,104| 12-Dec-2017| 19:05 \nblackberry.browser| | 2,389| 04-Jun-2015| 23:02 \nchrome.browser| | 2,107| 04-Jun-2015| 23:02 \ndefault.browser| | 11,568| 04-Jun-2015| 23:02 \nfirefox.browser| | 2,336| 04-Jun-2015| 23:02 \ngateway.browser| | 5,630| 04-Jun-2015| 23:02 \ngeneric.browser| | 5,569| 04-Jun-2015| 23:02 \nie.browser| | 5,166| 04-Jun-2015| 23:02 \niemobile.browser| | 4,045| 04-Jun-2015| 23:02 \niphone.browser| | 1,759| 04-Jun-2015| 23:02 \nopera.browser| | 5,248| 04-Jun-2015| 23:02 \nsafari.browser| | 3,560| 04-Jun-2015| 23:02 \nucbrowser.browser| | 1,725| 04-Jun-2015| 23:02 \nclr-etw.man| | 303,549| 28-Dec-2016| 04:30 \nclretwrc.dll| 4.0.30319.36366| 228,008| 28-Dec-2016| 04:30 \nclrjit.dll| 4.0.30319.36460| 510,464| 24-Jul-2018| 15:10 \nclr.dll| 4.0.30319.36460| 6,939,640| 24-Jul-2018| 15:10 \ncorperfmonext.dll| 4.0.30319.36366| 127,672| 11-Aug-2016| 13:22 \ncsc.rsp| | 1,329| 04-Jun-2015| 23:02 \ncsc.exe| 4.0.30319.36366| 1,853,072| 11-Aug-2016| 13:22 \ncsc.exe.config| | 182| 04-Jun-2015| 23:02 \nculture.dll| 4.0.30319.36366| 54,432| 22-Aug-2016| 13:09 \nlocale.nlp| | 419,632| 22-Aug-2015| 13:09 \ndfdll.dll| 4.0.30319.36366| 141,976| 11-Aug-2016| 13:22 \ninstallpersistsqlstate.sql| | 54,647| 28-Dec-2016| 04:30 \ninstallsqlstatetemplate.sql| | 56,233| 28-Dec-2016| 04:30 \ninstallsqlstate.sql| | 54,427| 28-Dec-2016| 04:30 \nmicrosoft.common.overridetasks| | 6,297| 04-Jun-2015| 23:02 \nmicrosoft.data.entity.targets| | 6,501| 04-Jun-2015| 23:02 \nmicrosoft.workflowbuildextensions.targets| | 7,537| 27-Jul-2018| 07:24 \nmicrosoft.xaml.targets| | 19,848| 04-Jun-2015| 23:02 \nmmcaspext.dll| 4.0.30319.36366| 107,176| 11-Aug-2016| 13:22 \nmicrosoft.common.targets| | 262,547| 04-Jun-2015| 23:02 \nmicrosoft.csharp.targets| | 23,618| 04-Jun-2015| 23:02 \nmicrosoft.netframework.props| | 11,957| 04-Jun-2015| 23:02 \nmicrosoft.netframework.targets| | 8,183| 04-Jun-2015| 23:02 \nmicrosoft.visualbasic.targets| | 23,329| 04-Jun-2015| 23:02 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 24-Jul-2018| 15:10 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 24-Jul-2018| 15:10 \nmscoreei.dll| 4.0.30319.36366| 516,256| 11-Aug-2016| 13:22 \nmscorrc.dll| 4.0.30319.36366| 395,936| 11-Aug-2016| 13:22 \nmscorsvc.dll| 4.0.30319.36366| 414,880| 11-Aug-2016| 13:22 \nmscorsvw.exe| 4.0.30319.36366| 103,600| 22-Aug-2016| 13:09 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 24-Jul-2018| 15:10 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 24-Jul-2018| 15:10 \nngen.exe| 4.0.30319.36366| 140,944| 22-Aug-2016| 13:09 \npenimc.dll| 4.0.30319.36393| 81,560| 06-Apr-2017| 20:26 \npeverify.dll| 4.0.30319.36460| 163,968| 24-Jul-2018| 15:10 \npresentationhost_v0400.dll| 4.0.30319.36393| 186,072| 06-Apr-2017| 20:26 \npresentationnative_v0400.dll| 4.0.30319.36393| 790,240| 06-Apr-2017| 20:26 \nservicemonikersupport.dll| 4.0.30319.36450| 28,360| 08-Jun-2018| 16:05 \nsos.dll| 4.0.30319.36460| 762,472| 24-Jul-2018| 15:10 \nsystem.addin.dll| 4.0.30319.36366| 163,504| 11-Aug-2016| 13:22 \nsystem.core.dll| 4.0.30319.36393| 1,271,968| 06-Apr-2017| 20:26 \nsystem.data.entity.dll| 4.0.30319.36366| 4,099,272| 11-Aug-2016| 13:22 \nsystem.data.linq.dll| 4.0.30319.36366| 698,568| 11-Aug-2016| 13:22 \nsystem.net.dll| 4.0.30319.36366| 259,736| 11-Aug-2016| 13:22 \nsystem.web.extensions.dll| 4.0.30319.36430| 1,859,280| 12-Dec-2017| 19:05 \nvbc.rsp| | 1,467| 04-Jun-2015| 23:03 \nvbc.exe| 12.0.52366.36366| 2,459,280| 11-Aug-2016| 13:22 \nvbc.exe.config| | 182| 04-Jun-2015| 23:03 \nwebengine4.dll| 4.0.30319.36430| 509,584| 12-Dec-2017| 19:05 \nwebengine.dll| 4.0.30319.36430| 24,720| 12-Dec-2017| 19:05 \nwminet_utils.dll| 4.0.30319.36403| 126,128| 09-Jun-2017| 13:10 \nworkflowservicehostperformancecounters.dll| 4.0.30319.36450| 75,536| 27-Jul-2018| 07:24 \nwpfgfx_v0400.dll| 4.0.30319.36393| 1,648,304| 06-Apr-2017| 20:26 \npresentationcore.dll| 4.0.30319.36393| 3,226,976| 06-Apr-2017| 20:26 \nsystem.data.dll| 4.0.30319.36393| 3,209,392| 06-Apr-2017| 20:26 \nsystem.printing.dll| 4.0.30319.36366| 343,384| 11-Aug-2016| 13:22 \nsystem.transactions.dll| 4.0.30319.36366| 289,488| 11-Aug-2016| 13:22 \nsystem.web.dll| 4.0.30319.36430| 5,464,208| 12-Dec-2017| 19:05 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows Server 2012 (KB 4344148)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344148", "href": "https://support.microsoft.com/en-us/help/4344148", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:00", "description": "None\nThis article also applies to the following:\n\n * Microsoft .NET Framework 3.5\n\n## Summary\n\nThis update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows Server 2012, see the following article in the Microsoft Knowledge Base:[4345591](<https://support.microsoft.com/help/4345591>) Security and Quality Rollup updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4345591)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345591** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces previously released updates [4340557](<https://support.microsoft.com/help/4340557>) and [4291495](<https://support.microsoft.com/help/4291495>). \n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8-RT-KB4344150-x64.msu| 39F7CB387D005D79621303989218BCDA45F3E323| E15BC2C41D9B0E51D2171C79D8B7FE0357DB0BAA017D5A5D67A3F54564C1A2E8 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 21-Nov-2017| 07:23 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 07:23 \nksc.nlp| | 116,756| 21-Nov-2017| 07:23 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 07:23 \nprc.nlp| | 83,748| 21-Nov-2017| 07:23 \nprcp.nlp| | 83,748| 21-Nov-2017| 07:23 \nsortkey.nlp| | 262,148| 21-Nov-2017| 07:23 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 07:23 \nxjis.nlp| | 28,288| 21-Nov-2017| 07:23 \naspnet_wp.exe| 2.0.50727.8762| 43,160| 07-Apr-2017| 13:09 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 15:10 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 01-Dec-2017| 13:13 \nsystem.management.dll| 2.0.50727.8766| 389,120| 12-Jul-2017| 13:09 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:09 \nsystem.security.dll| 2.0.50727.8784| 274,432| 27-Mar-2018| 17:37 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 07-Apr-2017| 13:09 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 01-Dec-2017| 13:13 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:30 \nwebengine.dll| 2.0.50727.8762| 746,648| 07-Apr-2017| 13:09 \nwminet_utils.dll| 2.0.50727.8766| 140,960| 12-Jul-2017| 13:09 \npresentationcore.dll| 3.0.6920.8773| 4,006,400| 29-Mar-2017| 13:09 \npresentationfontcache.exe.config| | 161| 06-Jul-2012| 20:06 \nwpfgfx_v0300.dll| 3.0.6920.8773| 2,256,032| 29-Mar-2017| 13:09 \nsystem.data.dll| 2.0.50727.8762| 3,150,336| 06-Apr-2017| 20:26 \nsystem.printing.dll| 3.0.6920.8773| 358,400| 29-Mar-2017| 13:09 \nsystem.web.dll| 2.0.50727.8762| 5,296,128| 07-Apr-2017| 13:09 \nservicemonikersupport.dll| 3.0.4506.8800| 20,144| 11-Jun-2018| 13:06 \nsmdiagnostics.dll| 3.0.4506.8800| 94,208| 11-Jun-2018| 13:06 \nsmsvchost.exe| 3.0.4506.8800| 117,376| 11-Jun-2018| 13:06 \nsystem.identitymodel.dll| 3.0.4506.8800| 405,504| 11-Jun-2018| 13:06 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 13:06 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 13:06 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 13:06 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:06 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 13:06 \npenimc.dll| 3.0.6920.8773| 85,648| 29-Mar-2017| 13:09 \npresentationframework.dll| 3.0.6920.8773| 4,640,768| 29-Mar-2017| 13:09 \npresentationhostdll.dll| 3.0.6920.8773| 172,208| 29-Mar-2017| 13:09 \nreachframework.dll| 3.0.6920.8773| 532,480| 29-Mar-2017| 13:09 \nwindowsbase.dll| 3.0.6920.8773| 1,118,208| 29-Mar-2017| 13:09 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,060,864| 11-Jun-2018| 13:06 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,519,616| 11-Jun-2018| 13:06 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 454,656| 11-Jun-2018| 13:06 \nmscorlib.resources.dll| 2.0.50727.4927| 352,256| 21-Nov-2017| 07:26 \nmscorlib.resources.dll| 2.0.50727.4927| 303,104| 21-Nov-2017| 07:30 \nmscorlib.resources.dll| 2.0.50727.4927| 299,008| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.6400| 315,392| 21-Nov-2017| 07:30 \nmscorlib.resources.dll| 2.0.50727.4927| 425,984| 21-Nov-2017| 07:27 \nmscorlib.resources.dll| 2.0.50727.6400| 307,200| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.4927| 299,008| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.6400| 311,296| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.4927| 331,776| 21-Nov-2017| 07:27 \nmscorlib.resources.dll| 2.0.50727.4927| 315,392| 21-Nov-2017| 07:29 \nmscorlib.resources.dll| 2.0.50727.6400| 307,200| 21-Nov-2017| 07:30 \nmscorlib.resources.dll| 2.0.50727.6400| 348,160| 21-Nov-2017| 07:27 \nmscorlib.resources.dll| 2.0.50727.6400| 319,488| 21-Nov-2017| 07:31 \nmscorlib.resources.dll| 2.0.50727.4927| 290,816| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.6400| 303,104| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.4927| 311,296| 21-Nov-2017| 07:30 \nmscorlib.resources.dll| 2.0.50727.4927| 303,104| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.4927| 307,200| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.4927| 397,312| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.4927| 299,008| 21-Nov-2017| 07:29 \nmscorlib.resources.dll| 2.0.50727.4927| 299,008| 21-Nov-2017| 07:29 \nmscorlib.resources.dll| 2.0.50727.6400| 278,528| 21-Nov-2017| 07:28 \nmscorlib.resources.dll| 2.0.50727.6400| 278,528| 21-Nov-2017| 07:28 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 29-Mar-2017| 13:09 \nreachframework.dll| 3.0.6920.8773| 532,480| 29-Mar-2017| 13:09 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 13:06 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 13:06 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 01-Dec-2017| 13:05 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:06 \nsystem.management.dll| 2.0.50727.8766| 389,120| 12-Jul-2017| 13:09 \nsystem.resources.dll| 2.0.50727.4927| 237,568| 21-Nov-2017| 07:27 \nsystem.resources.dll| 2.0.50727.4927| 200,704| 21-Nov-2017| 07:30 \nsystem.resources.dll| 2.0.50727.4927| 196,608| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.6400| 212,992| 21-Nov-2017| 07:30 \nsystem.resources.dll| 2.0.50727.4927| 290,816| 21-Nov-2017| 07:27 \nsystem.resources.dll| 2.0.50727.6400| 208,896| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.4927| 196,608| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.6400| 212,992| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.4927| 217,088| 21-Nov-2017| 07:27 \nsystem.resources.dll| 2.0.50727.4927| 212,992| 21-Nov-2017| 07:30 \nsystem.resources.dll| 2.0.50727.6400| 204,800| 21-Nov-2017| 07:30 \nsystem.resources.dll| 2.0.50727.6400| 233,472| 21-Nov-2017| 07:27 \nsystem.resources.dll| 2.0.50727.6400| 217,088| 21-Nov-2017| 07:31 \nsystem.resources.dll| 2.0.50727.4927| 192,512| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.6400| 208,896| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.4927| 204,800| 21-Nov-2017| 07:30 \nsystem.resources.dll| 2.0.50727.4927| 204,800| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.4927| 204,800| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.4927| 262,144| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.4927| 196,608| 21-Nov-2017| 07:29 \nsystem.resources.dll| 2.0.50727.4927| 196,608| 21-Nov-2017| 07:29 \nsystem.resources.dll| 2.0.50727.6400| 184,320| 21-Nov-2017| 07:28 \nsystem.resources.dll| 2.0.50727.6400| 184,320| 21-Nov-2017| 07:28 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:08 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:06 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:06 \nsystem.security.dll| 2.0.50727.8784| 274,432| 27-Mar-2018| 17:37 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:06 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:06 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:06 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 07-Apr-2017| 13:09 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:06 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:06 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:06 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 01-Dec-2017| 13:05 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:30 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 29-Mar-2017| 13:09 \nbig5.nlp| | 66,728| 21-Nov-2017| 07:23 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 07:23 \nksc.nlp| | 116,756| 21-Nov-2017| 07:23 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 07:23 \nprc.nlp| | 83,748| 21-Nov-2017| 07:23 \nprcp.nlp| | 83,748| 21-Nov-2017| 07:23 \nsortkey.nlp| | 262,148| 21-Nov-2017| 07:23 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 07:23 \nxjis.nlp| | 28,288| 21-Nov-2017| 07:23 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 07-Apr-2017| 13:09 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \nwebengine.dll| 2.0.50727.8762| 437,400| 07-Apr-2017| 13:09 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 12-Jul-2017| 13:09 \npresentationcore.dll| 3.0.6920.8773| 4,222,976| 29-Mar-2017| 13:09 \npresentationfontcache.exe.config| | 161| 06-Jul-2012| 20:04 \nwpfgfx_v0300.dll| 3.0.6920.8773| 1,737,888| 29-Mar-2017| 13:09 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 06-Apr-2017| 20:26 \nsystem.printing.dll| 3.0.6920.8773| 372,736| 29-Mar-2017| 13:09 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 07-Apr-2017| 13:09 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 13:06 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:06 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:06 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:06 \npenimc.dll| 3.0.6920.8773| 68,752| 29-Mar-2017| 13:09 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 29-Mar-2017| 13:09 \npresentationhostdll.dll| 3.0.6920.8773| 131,248| 29-Mar-2017| 13:09 \nreachframework.dll| 3.0.6920.8773| 532,480| 29-Mar-2017| 13:09 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 29-Mar-2017| 13:09 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:06 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:06 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:06 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 3.5 for Windows Server 2012 (KB 4344150)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344150", "href": "https://support.microsoft.com/en-us/help/4344150", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:06", "description": "None\nThis article also applies to the following:\n\n * Microsoft .NET Framework 3.5\n\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows Server 2012, see the following article in the Microsoft Knowledge Base:[4345680](<https://support.microsoft.com/help/4345680>) Security Only updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4345680)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345680>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345680** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces update [3142025](<https://support.microsoft.com/help/3142025>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8-RT-KB4344175-x64.msu| 4441CCEF3FC9C39E514CD41B05935DB1B472FB1A| FB6F4EB53BD2D8A70C3DC998D7041915F3396B16A1E9B1671C2193EF6AAE00DE \nWindows8-RT-KB4344175-x86.msu| B113A6FED8300718EAA7F147037A813EA6DDDBEE| F8DD66968827CCF8F9047DD9BC72BFD90B100A5A6EF2A9E16E48E48254F5D22E \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:30 \nbig5.nlp| | 66,728| 21-Nov-2017| 07:23 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 07:23 \nksc.nlp| | 116,756| 21-Nov-2017| 07:23 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 07:23 \nprc.nlp| | 83,748| 21-Nov-2017| 07:23 \nprcp.nlp| | 83,748| 21-Nov-2017| 07:23 \nsortkey.nlp| | 262,148| 21-Nov-2017| 07:23 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 07:23 \nxjis.nlp| | 28,288| 21-Nov-2017| 07:23 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 21-Nov-2017| 07:23 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 07:23 \nksc.nlp| | 116,756| 21-Nov-2017| 07:23 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 07:23 \nprc.nlp| | 83,748| 21-Nov-2017| 07:23 \nprcp.nlp| | 83,748| 21-Nov-2017| 07:23 \nsortkey.nlp| | 262,148| 21-Nov-2017| 07:23 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 07:23 \nxjis.nlp| | 28,288| 21-Nov-2017| 07:23 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 15:10 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:30 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:30 \nbig5.nlp| | 66,728| 21-Nov-2017| 07:23 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 07:23 \nksc.nlp| | 116,756| 21-Nov-2017| 07:23 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 07:23 \nprc.nlp| | 83,748| 21-Nov-2017| 07:23 \nprcp.nlp| | 83,748| 21-Nov-2017| 07:23 \nsortkey.nlp| | 262,148| 21-Nov-2017| 07:23 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 07:23 \nxjis.nlp| | 28,288| 21-Nov-2017| 07:23 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 3.5 for Windows Server 2012 (KB 4344175)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344175", "href": "https://support.microsoft.com/en-us/help/4344175", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:06", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows Server 2012, see the following article in the Microsoft Knowledge Base:[4345680](<https://support.microsoft.com/help/4345680>) Security Only updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4345680)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345680>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345680** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces update [4020506](<https://support.microsoft.com/help/4020506>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8-RT-KB4344172-x64.msu| 7831936B31A5FDC51CF249CCD8CC8CB6E9BC4E85| D05448BF7DED0E1516B858D6C3BA1AE62777594BB81D70AE68AA5CA482CDC32B \nWindows8-RT-KB4344172-x86.msu| E1E87503CA3A9045DC7D86EC100DDE4E373F8018| AC44B7BB9C2FD7F5F4D0FA86C70E5A9B762D4C7D228ED339328C1B409A133B75 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nsystem.dll| 4.0.30319.36455| 3,488,792| 13-Jul-2018| 02:54 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 47,076| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 40,566| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 67,808| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 61,718| 21-Nov-2017| 07:23 \nclrjit.dll| 4.0.30319.36460| 510,464| 24-Jul-2018| 15:10 \nclr.dll| 4.0.30319.36460| 6,939,640| 24-Jul-2018| 15:10 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 24-Jul-2018| 15:10 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 24-Jul-2018| 15:10 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 24-Jul-2018| 15:10 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 24-Jul-2018| 15:10 \npeverify.dll| 4.0.30319.36460| 163,968| 24-Jul-2018| 15:10 \nsos.dll| 4.0.30319.36460| 762,472| 24-Jul-2018| 15:10 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.0.30319.36460| 5,219,968| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 47,076| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 40,566| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 67,808| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 61,718| 21-Nov-2017| 07:23 \nclrjit.dll| 4.0.30319.36460| 1,234,552| 24-Jul-2018| 15:10 \nclr.dll| 4.0.30319.36460| 10,070,120| 24-Jul-2018| 15:10 \nmscordacwks.dll| 4.0.30319.36460| 1,731,208| 24-Jul-2018| 15:10 \nmscordbi.dll| 4.0.30319.36460| 1,533,568| 24-Jul-2018| 15:10 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 678,584| 24-Jul-2018| 15:10 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 869,536| 24-Jul-2018| 15:10 \npeverify.dll| 4.0.30319.36460| 225,920| 24-Jul-2018| 15:10 \nsos.dll| 4.0.30319.36460| 822,888| 24-Jul-2018| 15:10 \nsystem.dll| 4.0.30319.36455| 3,488,792| 13-Jul-2018| 02:55 \nsystem.dll| 4.0.30319.36455| 3,488,792| 13-Jul-2018| 02:54 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 47,076| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 40,566| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 67,808| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 61,718| 21-Nov-2017| 07:23 \nclrjit.dll| 4.0.30319.36460| 510,464| 24-Jul-2018| 15:10 \nclr.dll| 4.0.30319.36460| 6,939,640| 24-Jul-2018| 15:10 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 24-Jul-2018| 15:10 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 24-Jul-2018| 15:10 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 24-Jul-2018| 15:10 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 24-Jul-2018| 15:10 \npeverify.dll| 4.0.30319.36460| 163,968| 24-Jul-2018| 15:10 \nsos.dll| 4.0.30319.36460| 762,472| 24-Jul-2018| 15:10 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 4.5.2 for Windows Server 2012 (KB 4344172)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344172", "href": "https://support.microsoft.com/en-us/help/4344172", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:06", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows Server 2008, see the following article in the Microsoft Knowledge Base:[4345682](<https://support.microsoft.com/help/4345682>) Security Only updates for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 for Windows Server 2008 SP2 (KB 4345682)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345682>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345682** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces update [3142023](<https://support.microsoft.com/help/3142023>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows6.0-KB4344176-ia64.msu| BC1159BC6CF9011EACE2CE7B98190513CC2158B7| 77C6C3A8DEC0652A9525F3AA5C473B22B1C7C2D69C6AA33003F86C501E908BB2 \nWindows6.0-KB4344176-x64.msu| BAFC7AF010D7FF7076B49D514A6D7F8335AE4BB3| FEA19B105364A284BA12E9C44085F47D47F965059D508BE461FB32DA3F0AA21F \nWindows6.0-KB4344176-x86.msu| 9DEB7A612BE3E1F882B6BDAAFBFA0FA2052A37E8| 9FE1496C0846DDA8B9B39A2A1C9D469EB5630D70C548FA337639D2CEB0DE97C2 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.resources.dll| 2.0.50727.4016| 352,256| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 425,984| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 331,776| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 348,160| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 319,488| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 290,816| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 397,312| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 241,664| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 204,800| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 294,912| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 221,184| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 204,800| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 233,472| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 196,608| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 266,240| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:26 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nbig5.nlp| | 66,728| 21-Nov-2017| 04:33 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:33 \nksc.nlp| | 116,756| 21-Nov-2017| 04:33 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:33 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:33 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:33 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:33 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:33 \nprc.nlp| | 83,748| 21-Nov-2017| 04:33 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:33 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:33 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:33 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:33 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 21-Nov-2017| 04:32 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:32 \nksc.nlp| | 116,756| 21-Nov-2017| 04:32 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:32 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:32 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:32 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:32 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:32 \nprc.nlp| | 83,748| 21-Nov-2017| 04:32 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:32 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:32 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:32 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:32 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 15:10 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nmscorlib.resources.dll| 2.0.50727.4016| 352,256| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 425,984| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 331,776| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 348,160| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 319,488| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 290,816| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 397,312| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 241,664| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 204,800| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 294,912| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 221,184| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 204,800| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 233,472| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 196,608| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 266,240| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:26 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nbig5.nlp| | 66,728| 21-Nov-2017| 04:33 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:33 \nksc.nlp| | 116,756| 21-Nov-2017| 04:33 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:33 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:33 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:33 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:33 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:33 \nprc.nlp| | 83,748| 21-Nov-2017| 04:33 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:33 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:33 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:33 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:33 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \n**For all supported IA64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 21-Nov-2017| 04:32 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:32 \nksc.nlp| | 116,756| 21-Nov-2017| 04:32 \nmscorlib.dll| 2.0.50727.8793| 4,014,080| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:32 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:32 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:32 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:32 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:32 \nprc.nlp| | 83,748| 21-Nov-2017| 04:32 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:32 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:32 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:32 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:32 \nmscordacwks.dll| 2.0.50727.8793| 3,083,400| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 602,752| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 20,404,864| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 873,592| 24-Jul-2018| 15:10 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:25 \nmscorlib.resources.dll| 2.0.50727.4016| 348,160| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 319,488| 21-Mar-2018| 16:25 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:25 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:25 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Mar-2018| 16:25 \nsystem.resources.dll| 2.0.50727.4016| 233,472| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:25 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:25 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:25 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nbig5.nlp| | 66,728| 21-Nov-2017| 04:33 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:33 \nksc.nlp| | 116,756| 21-Nov-2017| 04:33 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:33 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:33 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:33 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:33 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:33 \nprc.nlp| | 83,748| 21-Nov-2017| 04:33 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:33 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:33 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:33 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:33 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 2.0 SP2 and 3.0 SP2 for Windows Server 2008 SP2 (KB 4344176)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344176", "href": "https://support.microsoft.com/en-us/help/4344176", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T22:35:30", "description": "<html><body><p>Resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments.</p><h2></h2><p>This article also applies to the following:</p><ul><li>Microsoft .NET Framework 3.5</li></ul><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.</p><p>To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.</p><p>This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360\" id=\"kb-link-2\" target=\"\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8360</a>.</div><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see </span></span></span><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/4019990\" target=\"_blank\">KB 4019990</a><span><span><span>.</span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344175\" managed-link=\"\" target=\"_blank\">4344175</a> Description of the Security Only update for .NET Framework 3.5 for Windows Server 2012 (KB 4344175)</span></li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344172\" managed-link=\"\" target=\"_blank\">4344172</a> Description of the Security Only update for .NET Framework 4.5.2 for Windows Server 2012 (KB 4344172)</li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344165\" managed-link=\"\" target=\"_blank\">4344165</a> Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4344165)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-14T17:07:55", "type": "mskb", "title": "Security Only updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4345680)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T17:07:55", "id": "KB4345680", "href": "https://support.microsoft.com/en-us/help/4345680/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T22:46:07", "description": "<html><body><p>Resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments.</p><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which\u00a0content from one stream can blend into another stream.</p><p>To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.</p><p>This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360\" id=\"kb-link-2\" target=\"\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8360</a>.</div><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6 for Windows Server 2008 require the d3dcompiler_47.dll update to be installed. We recommend that you install the included d3dcompiler_47.dll update before you apply this update. For more information about the d3dcompiler_47.dll update, see </span></span></span><a href=\"https://support.microsoft.com/en-us/help/4019478\"><span><span><span>KB 4019478</span></span></span></a><span><span><span>.</span></span></span></span></span></span><span><span><span><span><span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4344176\" managed-link=\"\">4344176</a> Description of the Security Only update for .NET Framework 2.0 SP2 and 3.0 SP2 for Windows Server 2008 SP2 (KB 4344176)</span></li><li><a href=\"https://support.microsoft.com/help/4344173\" managed-link=\"\">4344173</a> Description of the Security Only update for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 SP2 (KB 4344173)</li><li><a href=\"https://support.microsoft.com/help/4344167\" managed-link=\"\">4344167</a> Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1, and for .NET Framework 4.6 for Server 2008 SP2 (KB 4344167)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-14T17:07:59", "type": "mskb", "title": "Security Only updates for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 for Windows Server 2008 SP2 (KB 4345682)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T17:07:59", "id": "KB4345682", "href": "https://support.microsoft.com/en-us/help/4345682/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T22:40:13", "description": "<html><body><p>Resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments.</p><h2></h2><p>This article also applies to the following:</p><ul><li>Microsoft .NET Framework 3.5</li></ul><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which\u00a0content from one stream can blend into another stream.</p><p>To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.</p><p>This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360\" id=\"kb-link-2\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8360</a>.</div><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see </span></span></span><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/4019990\" target=\"_blank\">KB 4019990</a><span><span><span>.</span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.</span></div><div>\u00a0</div><ul><li><span><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344150\" managed-link=\"\" target=\"_blank\">4344150</a> Description of the Security and Quality Rollup for .NET Framework 3.5 for Windows Server 2012 (KB 4344150)</span></li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344148\" managed-link=\"\" target=\"_blank\">4344148</a> Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows Server 2012 (KB 4344148)</li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344144\" managed-link=\"\" target=\"_blank\">4344144</a> Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4344144)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-14T17:07:54", "type": "mskb", "title": "Security and Quality Rollup updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows Server 2012 (KB 4345591)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T17:07:54", "id": "KB4345591", "href": "https://support.microsoft.com/en-us/help/4345591/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:07", "description": "None\nThis article also applies to the following:\n\n * Microsoft .NET Framework 3.5\n\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update [KB 2919355](<https://support.microsoft.com/en-us/help/2919355>) to be installed. We recommend that you install update [KB 2919355](<https://support.microsoft.com/en-us/help/2919355>) on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2, see the following article in the Microsoft Knowledge Base:[4345681](<https://support.microsoft.com/help/4345681>) Security Only updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4345681)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345681>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345681** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces updates [3142026](<https://support.microsoft.com/help/3142026>) and [3142030](<https://support.microsoft.com/help/3142030>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8.1-KB4344178-x64.msu| 5242D857DE04426465D8AC4DCCB030A42B896AA3| AFFE288BDBC8A0CEBF5D748238474E44DCF9E0C05EE51FCAFF63212E87962C0C \nWindows8.1-KB4344178-x86.msu| 8B8A0AF5ECB33BBA9299586A8FB46080EE28082A| EE21B2FF73F0154532CB1253C31DAB1133FE041826677B20686BED661ED92987 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nsystem.dll| 2.0.50727.8791| 3,207,168| 11-Jul-2018| 13:11 \nbig5.nlp| | 66,728| 07-Nov-2017| 17:46 \nbopomofo.nlp| | 82,172| 07-Nov-2017| 17:46 \nksc.nlp| | 116,756| 07-Nov-2017| 17:46 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 13:10 \nnormidna.nlp| | 59,342| 07-Nov-2017| 17:46 \nnormnfc.nlp| | 45,794| 07-Nov-2017| 17:46 \nnormnfd.nlp| | 39,284| 07-Nov-2017| 17:46 \nnormnfkc.nlp| | 66,384| 07-Nov-2017| 17:46 \nnormnfkd.nlp| | 60,294| 07-Nov-2017| 17:46 \nprc.nlp| | 83,748| 07-Nov-2017| 17:46 \nprcp.nlp| | 83,748| 07-Nov-2017| 17:46 \nsortkey.nlp| | 262,148| 07-Nov-2017| 17:46 \nsorttbls.nlp| | 20,320| 07-Nov-2017| 17:46 \nxjis.nlp| | 28,288| 07-Nov-2017| 17:46 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 13:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 13:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 13:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 13:10 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 26-Oct-2017| 16:05 \nbopomofo.nlp| | 82,172| 26-Oct-2017| 16:05 \nksc.nlp| | 116,756| 26-Oct-2017| 16:05 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 13:11 \nnormidna.nlp| | 59,342| 26-Oct-2017| 16:05 \nnormnfc.nlp| | 45,794| 26-Oct-2017| 16:05 \nnormnfd.nlp| | 39,284| 26-Oct-2017| 16:05 \nnormnfkc.nlp| | 66,384| 26-Oct-2017| 16:05 \nnormnfkd.nlp| | 60,294| 26-Oct-2017| 16:05 \nprc.nlp| | 83,748| 26-Oct-2017| 16:05 \nprcp.nlp| | 83,748| 26-Oct-2017| 16:05 \nsortkey.nlp| | 262,148| 26-Oct-2017| 16:05 \nsorttbls.nlp| | 20,320| 26-Oct-2017| 16:05 \nxjis.nlp| | 28,288| 26-Oct-2017| 16:05 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 13:11 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 13:11 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 13:11 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 13:11 \nsystem.dll| 2.0.50727.8791| 3,207,168| 11-Jul-2018| 13:12 \nsystem.dll| 2.0.50727.8791| 3,207,168| 11-Jul-2018| 13:11 \nbig5.nlp| | 66,728| 07-Nov-2017| 17:46 \nbopomofo.nlp| | 82,172| 07-Nov-2017| 17:46 \nksc.nlp| | 116,756| 07-Nov-2017| 17:46 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 13:10 \nnormidna.nlp| | 59,342| 07-Nov-2017| 17:46 \nnormnfc.nlp| | 45,794| 07-Nov-2017| 17:46 \nnormnfd.nlp| | 39,284| 07-Nov-2017| 17:46 \nnormnfkc.nlp| | 66,384| 07-Nov-2017| 17:46 \nnormnfkd.nlp| | 60,294| 07-Nov-2017| 17:46 \nprc.nlp| | 83,748| 07-Nov-2017| 17:46 \nprcp.nlp| | 83,748| 07-Nov-2017| 17:46 \nsortkey.nlp| | 262,148| 07-Nov-2017| 17:46 \nsorttbls.nlp| | 20,320| 07-Nov-2017| 17:46 \nxjis.nlp| | 28,288| 07-Nov-2017| 17:46 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 13:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 13:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 13:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 13:10 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 3.5 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4344178)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344178", "href": "https://support.microsoft.com/en-us/help/4344178", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:03", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update [2919355](<https://support.microsoft.com/en-us/help/2919355>) to be installed. We recommend that you install update [2919355](<https://support.microsoft.com/en-us/help/2919355>) on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2, see the following article in the Microsoft Knowledge Base:[4345681](<https://support.microsoft.com/help/4345681>) Security Only updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4345681)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345681>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345681** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update does not replace any previously released update.\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8.1-KB4344166-arm.msu| 1F381AD49A428705B13FC2B3F552427E340311CE| A7A495B4140102808FFC58CD2194F1B2B5FCBB337CCC1E558FD66FFDE912CEA6 \nWindows8.1-KB4344166-x64.msu| CCC4D1BA7D8288B04FBFD22BC97FC5734B38E5F6| D56A3821F43F498AB58C952FE392F2147849BEC07B93E8F4D241473B2F6220FD \nWindows8.1-KB4344166-x86.msu| D6D7F4CC9DB889A2559F75750F016E640B8F992F| 6D5161C0C0BEC1CA26253756C214188C5D4F8A6B39DDA5AF2CD845EF56917406 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 25-Jul-2018| 02:50 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \nclrjit.dll| 4.7.3133.0| 524,288| 25-Jul-2018| 02:50 \nclr.dll| 4.7.3133.0| 7,249,400| 25-Jul-2018| 02:50 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 25-Jul-2018| 02:50 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 25-Jul-2018| 02:50 \nmscorlib.ni.dll| 4.7.3133.0| 20,528,720| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 11-May-2018| 01:43 \npeverify.dll| 4.7.3133.0| 189,960| 25-Jul-2018| 02:50 \nsos.dll| 4.7.3133.0| 744,952| 25-Jul-2018| 02:50 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.7.3133.0| 5,420,992| 25-Jul-2018| 02:09 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \nclrjit.dll| 4.7.3133.0| 1,227,192| 25-Jul-2018| 02:09 \nclr.dll| 4.7.3133.0| 10,378,664| 25-Jul-2018| 02:09 \ncompatjit.dll| 4.7.3133.0| 1,262,528| 25-Jul-2018| 02:09 \nmscordacwks.dll| 4.7.3133.0| 1,843,656| 25-Jul-2018| 02:09 \nmscordbi.dll| 4.7.3133.0| 1,625,024| 25-Jul-2018| 02:09 \nmscorlib.ni.dll| 4.7.3133.0| 22,590,008| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52519.0| 690,008| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 993,632| 11-May-2018| 01:43 \npeverify.dll| 4.7.3133.0| 263,104| 25-Jul-2018| 02:09 \nsos.dll| 4.7.3133.0| 874,920| 25-Jul-2018| 02:09 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 25-Jul-2018| 02:50 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \nclrjit.dll| 4.7.3133.0| 524,288| 25-Jul-2018| 02:50 \nclr.dll| 4.7.3133.0| 7,249,400| 25-Jul-2018| 02:50 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 25-Jul-2018| 02:50 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 25-Jul-2018| 02:50 \nmscorlib.ni.dll| 4.7.3133.0| 20,528,720| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 11-May-2018| 01:43 \npeverify.dll| 4.7.3133.0| 189,960| 25-Jul-2018| 02:50 \nsos.dll| 4.7.3133.0| 744,952| 25-Jul-2018| 02:50 \n**For all supported ARM-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.7.3133.0| 5,639,048| 25-Jul-2018| 02:09 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \nclrjit.dll| 4.7.3133.0| 686,976| 25-Jul-2018| 02:09 \nclr.dll| 4.7.3133.0| 6,759,800| 25-Jul-2018| 02:09 \nmscordacwks.dll| 4.7.3133.0| 1,296,792| 25-Jul-2018| 02:09 \nmscordbi.dll| 4.7.3133.0| 1,131,920| 25-Jul-2018| 02:09 \nmscorlib.ni.dll| 4.7.3133.0| 20,717,104| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52242.36242| 602,080| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52242.36242| 634,336| 11-May-2018| 01:43 \nsos.dll| 4.7.3133.0| 648,568| 25-Jul-2018| 02:09 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4344166)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344166", "href": "https://support.microsoft.com/en-us/help/4344166", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:03", "description": "None\nThis article also applies to the following:\n\n * Microsoft .NET Framework 3.5\n\n## Summary\n\nThis update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update [2919355](<https://support.microsoft.com/en-us/help/2919355>) to be installed. We recommend that you install update [2919355](<https://support.microsoft.com/en-us/help/2919355>) on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2, see the following article in the Microsoft Knowledge Base:[4345592](<https://support.microsoft.com/help/4345592>) Security and Quality Rollup updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4345592)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345592** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces previously released updates [4340558](<https://support.microsoft.com/help/4340558>) and [4291497](<https://support.microsoft.com/help/4291497>). \n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8.1-KB4344153-x64.msu| BE2840F79F50B30E571B229863D5993DFCDA0E0D| EC93C86E95CA87852B0FEFD6BF0804D26F4D58352E16AD10936658304EBB6349 \nWindows8.1-KB4344153-x86.msu| DE4685DD06AC23D190194E434DF4A0DCE5BE94F8| B0BC930FAF4DD194C9FC84087B2953AB88D99308567A7A61FA52555E84E846C6 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 30-Mar-2017| 13:15 \nreachframework.dll| 3.0.6920.8773| 532,480| 30-Mar-2017| 13:15 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 13:11 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 13:11 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 12-Dec-2017| 13:09 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:11 \nsystem.management.dll| 2.0.50727.8766| 389,120| 12-Jul-2017| 13:11 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:17 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:11 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:11 \nsystem.security.dll| 2.0.50727.8784| 274,432| 28-Mar-2018| 13:15 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:11 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:11 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:11 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 22-Apr-2017| 13:09 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:11 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:11 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:11 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 12-Dec-2017| 13:09 \nsystem.dll| 2.0.50727.8791| 3,207,168| 11-Jul-2018| 13:11 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 30-Mar-2017| 13:15 \nbig5.nlp| | 66,728| 07-Nov-2017| 17:46 \nbopomofo.nlp| | 82,172| 07-Nov-2017| 17:46 \nksc.nlp| | 116,756| 07-Nov-2017| 17:46 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 13:10 \nnormidna.nlp| | 59,342| 07-Nov-2017| 17:46 \nnormnfc.nlp| | 45,794| 07-Nov-2017| 17:46 \nnormnfd.nlp| | 39,284| 07-Nov-2017| 17:46 \nnormnfkc.nlp| | 66,384| 07-Nov-2017| 17:46 \nnormnfkd.nlp| | 60,294| 07-Nov-2017| 17:46 \nprc.nlp| | 83,748| 07-Nov-2017| 17:46 \nprcp.nlp| | 83,748| 07-Nov-2017| 17:46 \nsortkey.nlp| | 262,148| 07-Nov-2017| 17:46 \nsorttbls.nlp| | 20,320| 07-Nov-2017| 17:46 \nxjis.nlp| | 28,288| 07-Nov-2017| 17:46 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 22-Apr-2017| 13:09 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 13:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 13:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 13:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 13:10 \nwebengine.dll| 2.0.50727.8762| 437,400| 22-Apr-2017| 13:09 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 12-Jul-2017| 13:11 \npresentationcore.dll| 3.0.6920.8773| 4,222,976| 30-Mar-2017| 13:15 \npresentationfontcache.exe.config| | 161| 20-Aug-2015| 13:24 \nwpfgfx_v0300.dll| 3.0.6920.8773| 1,737,888| 30-Mar-2017| 13:15 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 22-Apr-2017| 13:09 \nsystem.printing.dll| 3.0.6920.8773| 372,736| 30-Mar-2017| 13:15 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 22-Apr-2017| 13:09 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 13:11 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:11 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:11 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:11 \npenimc.dll| 3.0.6920.8773| 68,752| 30-Mar-2017| 13:15 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 30-Mar-2017| 13:15 \npresentationhostdll.dll| 3.0.6920.8773| 131,248| 30-Mar-2017| 13:15 \nreachframework.dll| 3.0.6920.8773| 532,480| 30-Mar-2017| 13:15 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 30-Mar-2017| 13:15 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:11 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:11 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:11 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 26-Oct-2017| 16:05 \nbopomofo.nlp| | 82,172| 26-Oct-2017| 16:05 \nksc.nlp| | 116,756| 26-Oct-2017| 16:05 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 13:11 \nnormidna.nlp| | 59,342| 26-Oct-2017| 16:05 \nnormnfc.nlp| | 45,794| 26-Oct-2017| 16:05 \nnormnfd.nlp| | 39,284| 26-Oct-2017| 16:05 \nnormnfkc.nlp| | 66,384| 26-Oct-2017| 16:05 \nnormnfkd.nlp| | 60,294| 26-Oct-2017| 16:05 \nprc.nlp| | 83,748| 26-Oct-2017| 16:05 \nprcp.nlp| | 83,748| 26-Oct-2017| 16:05 \nsortkey.nlp| | 262,148| 26-Oct-2017| 16:05 \nsorttbls.nlp| | 20,320| 26-Oct-2017| 16:05 \nxjis.nlp| | 28,288| 26-Oct-2017| 16:05 \naspnet_wp.exe| 2.0.50727.8762| 43,160| 22-Apr-2017| 13:08 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 13:11 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 13:11 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 13:11 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 13:11 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 29-Nov-2017| 05:34 \nsystem.management.dll| 2.0.50727.8766| 389,120| 12-Jul-2017| 13:08 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:15 \nsystem.security.dll| 2.0.50727.8784| 274,432| 28-Mar-2018| 13:15 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 22-Apr-2017| 13:08 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 29-Nov-2017| 05:34 \nsystem.dll| 2.0.50727.8791| 3,207,168| 11-Jul-2018| 13:12 \nwebengine.dll| 2.0.50727.8762| 746,648| 22-Apr-2017| 13:08 \nwminet_utils.dll| 2.0.50727.8766| 140,960| 12-Jul-2017| 13:08 \npresentationcore.dll| 3.0.6920.8773| 4,006,400| 30-Mar-2017| 13:15 \npresentationfontcache.exe.config| | 161| 22-Aug-2015| 13:27 \nwpfgfx_v0300.dll| 3.0.6920.8773| 2,256,032| 30-Mar-2017| 13:15 \nsystem.data.dll| 2.0.50727.8762| 3,150,336| 22-Apr-2017| 13:08 \nsystem.printing.dll| 3.0.6920.8773| 358,400| 30-Mar-2017| 13:15 \nsystem.web.dll| 2.0.50727.8762| 5,296,128| 22-Apr-2017| 13:08 \nservicemonikersupport.dll| 3.0.4506.8800| 20,144| 11-Jun-2018| 13:10 \nsmdiagnostics.dll| 3.0.4506.8800| 94,208| 11-Jun-2018| 13:10 \nsmsvchost.exe| 3.0.4506.8800| 117,376| 11-Jun-2018| 13:10 \nsystem.identitymodel.dll| 3.0.4506.8800| 405,504| 11-Jun-2018| 13:09 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 13:10 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 13:10 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 13:10 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:10 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 13:10 \npenimc.dll| 3.0.6920.8773| 85,648| 30-Mar-2017| 13:15 \npresentationframework.dll| 3.0.6920.8773| 4,640,768| 30-Mar-2017| 13:15 \npresentationhostdll.dll| 3.0.6920.8773| 172,208| 30-Mar-2017| 13:15 \nreachframework.dll| 3.0.6920.8773| 532,480| 30-Mar-2017| 13:15 \nwindowsbase.dll| 3.0.6920.8773| 1,118,208| 30-Mar-2017| 13:15 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,060,864| 11-Jun-2018| 13:10 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,519,616| 11-Jun-2018| 13:10 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 454,656| 11-Jun-2018| 13:10 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 30-Mar-2017| 13:15 \nreachframework.dll| 3.0.6920.8773| 532,480| 30-Mar-2017| 13:15 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 13:11 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 13:11 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 12-Dec-2017| 13:09 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:11 \nsystem.management.dll| 2.0.50727.8766| 389,120| 12-Jul-2017| 13:11 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:17 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:11 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:11 \nsystem.security.dll| 2.0.50727.8784| 274,432| 28-Mar-2018| 13:15 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:11 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:11 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:11 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 22-Apr-2017| 13:09 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:11 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:11 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:11 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 12-Dec-2017| 13:09 \nsystem.dll| 2.0.50727.8791| 3,207,168| 11-Jul-2018| 13:11 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 30-Mar-2017| 13:15 \nbig5.nlp| | 66,728| 07-Nov-2017| 17:46 \nbopomofo.nlp| | 82,172| 07-Nov-2017| 17:46 \nksc.nlp| | 116,756| 07-Nov-2017| 17:46 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 13:10 \nnormidna.nlp| | 59,342| 07-Nov-2017| 17:46 \nnormnfc.nlp| | 45,794| 07-Nov-2017| 17:46 \nnormnfd.nlp| | 39,284| 07-Nov-2017| 17:46 \nnormnfkc.nlp| | 66,384| 07-Nov-2017| 17:46 \nnormnfkd.nlp| | 60,294| 07-Nov-2017| 17:46 \nprc.nlp| | 83,748| 07-Nov-2017| 17:46 \nprcp.nlp| | 83,748| 07-Nov-2017| 17:46 \nsortkey.nlp| | 262,148| 07-Nov-2017| 17:46 \nsorttbls.nlp| | 20,320| 07-Nov-2017| 17:46 \nxjis.nlp| | 28,288| 07-Nov-2017| 17:46 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 22-Apr-2017| 13:09 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 13:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 13:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 13:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 13:10 \nwebengine.dll| 2.0.50727.8762| 437,400| 22-Apr-2017| 13:09 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 12-Jul-2017| 13:11 \npresentationcore.dll| 3.0.6920.8773| 4,222,976| 30-Mar-2017| 13:15 \npresentationfontcache.exe.config| | 161| 20-Aug-2015| 13:24 \nwpfgfx_v0300.dll| 3.0.6920.8773| 1,737,888| 30-Mar-2017| 13:15 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 22-Apr-2017| 13:09 \nsystem.printing.dll| 3.0.6920.8773| 372,736| 30-Mar-2017| 13:15 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 22-Apr-2017| 13:09 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 13:11 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:11 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:11 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:11 \npenimc.dll| 3.0.6920.8773| 68,752| 30-Mar-2017| 13:15 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 30-Mar-2017| 13:15 \npresentationhostdll.dll| 3.0.6920.8773| 131,248| 30-Mar-2017| 13:15 \nreachframework.dll| 3.0.6920.8773| 532,480| 30-Mar-2017| 13:15 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 30-Mar-2017| 13:15 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:11 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:11 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:11 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 3.5 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4344153)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344153", "href": "https://support.microsoft.com/en-us/help/4344153", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:03", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 7 SP1 and Windows Server 2008 R2 SP1, see the following article in the Microsoft Knowledge Base:[4345590](<https://support.microsoft.com/help/4345590>) Security and Quality Rollup updates for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4345590)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345590** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces previously released updates [4340556](<https://support.microsoft.com/help/4340556>) and [4291493](<https://support.microsoft.com/help/4291493>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows6.1-KB4344152-ia64.msu| 274F953023722D521EDA2E844BB08F0878EA0DEA| 1278FF44B54D58202CAF6D0404E63B283B34F3A002981360224E484D4C3BFED5 \nWindows6.1-KB4344152-x64.msu| A4B728EAF3B80404339F0318E257E435758CB5FB| 64C7C91C7E12FA7E3A174D74670908275530C5EAEDD45A2D23DBFE1B0C912700 \nWindows6.1-KB4344152-x86.msu| A519003F0BE0689BCE0BAD796795C9794309E71F| AE041AB7CBF19608A1096B73C726A1ED7026032EF82F94E2A4ED8916A1CB28B3 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 29-Mar-2017| 13:05 \nreachframework.dll| 3.0.6920.8773| 532,480| 29-Mar-2017| 13:05 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 22:12 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 22:12 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 28-Nov-2017| 14:04 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 22:12 \nsystem.management.dll| 2.0.50727.8766| 389,120| 11-Jul-2017| 20:05 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:04 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.security.dll| 2.0.50727.8784| 274,432| 27-Mar-2018| 13:05 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 07-Apr-2017| 13:05 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 22:12 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 22:12 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 22:12 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 28-Nov-2017| 14:04 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 29-Mar-2017| 13:05 \nbig5.nlp| | 66,728| 16-Jun-2018| 05:11 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:11 \nksc.nlp| | 116,756| 16-Jun-2018| 05:11 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:12 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:12 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:12 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:12 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:12 \nprc.nlp| | 83,748| 16-Jun-2018| 05:12 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:12 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:12 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:12 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:13 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 07-Apr-2017| 13:05 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 16:53 \nwebengine.dll| 2.0.50727.8762| 437,400| 07-Apr-2017| 13:05 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 11-Jul-2017| 20:05 \npresentationcore.dll| 3.0.6920.8773| 4,222,976| 29-Mar-2017| 13:05 \npresentationfontcache.exe.config| | 161| 23-Mar-2016| 22:38 \nwpfgfx_v0300.dll| 3.0.6920.8773| 1,737,888| 29-Mar-2017| 13:05 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 06-Apr-2017| 13:05 \nsystem.printing.dll| 3.0.6920.8773| 372,736| 29-Mar-2017| 13:05 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 07-Apr-2017| 13:05 \nservicemodel.mof| | 85,113| 22-Jan-2018| 19:10 \nservicemodel.mof.uninstall| | 896| 22-Jan-2018| 19:10 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 22:12 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \npenimc.dll| 3.0.6920.8773| 68,752| 29-Mar-2017| 13:05 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 29-Mar-2017| 13:05 \npresentationhostdll.dll| 3.0.6920.8773| 131,248| 29-Mar-2017| 13:05 \nreachframework.dll| 3.0.6920.8773| 532,480| 29-Mar-2017| 13:05 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 29-Mar-2017| 13:05 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 22:12 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 22:12 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 22:12 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 16-Jun-2018| 05:09 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:09 \nksc.nlp| | 116,756| 16-Jun-2018| 05:09 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:10 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:10 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:10 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:10 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:10 \nprc.nlp| | 83,748| 16-Jun-2018| 05:10 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:10 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:10 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:10 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:10 \naspnet_wp.exe| 2.0.50727.8762| 43,160| 07-Apr-2017| 13:05 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 16:53 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 28-Nov-2017| 14:05 \nsystem.management.dll| 2.0.50727.8766| 389,120| 11-Jul-2017| 20:05 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:04 \nsystem.security.dll| 2.0.50727.8784| 274,432| 27-Mar-2018| 13:05 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 07-Apr-2017| 13:05 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 28-Nov-2017| 14:05 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nwebengine.dll| 2.0.50727.8762| 746,648| 07-Apr-2017| 13:05 \nwminet_utils.dll| 2.0.50727.8766| 140,960| 11-Jul-2017| 20:05 \npresentationcore.dll| 3.0.6920.8773| 4,006,400| 29-Mar-2017| 13:05 \npresentationfontcache.exe.config| | 161| 23-Mar-2016| 22:39 \nwpfgfx_v0300.dll| 3.0.6920.8773| 2,256,032| 29-Mar-2017| 13:05 \nsystem.data.dll| 2.0.50727.8762| 3,150,336| 06-Apr-2017| 13:05 \nsystem.printing.dll| 3.0.6920.8773| 358,400| 29-Mar-2017| 13:05 \nsystem.web.dll| 2.0.50727.8762| 5,296,128| 07-Apr-2017| 13:05 \nservicemodel.mof| | 85,113| 22-Jan-2018| 19:10 \nservicemodel.mof.uninstall| | 896| 22-Jan-2018| 19:10 \nservicemonikersupport.dll| 3.0.4506.8800| 20,144| 11-Jun-2018| 22:12 \nsmdiagnostics.dll| 3.0.4506.8800| 94,208| 11-Jun-2018| 22:12 \nsmsvchost.exe| 3.0.4506.8800| 117,376| 11-Jun-2018| 22:12 \nsystem.identitymodel.dll| 3.0.4506.8800| 405,504| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 22:12 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 22:12 \npenimc.dll| 3.0.6920.8773| 85,648| 29-Mar-2017| 13:05 \npresentationframework.dll| 3.0.6920.8773| 4,640,768| 29-Mar-2017| 13:05 \npresentationhostdll.dll| 3.0.6920.8773| 172,208| 29-Mar-2017| 13:05 \nreachframework.dll| 3.0.6920.8773| 532,480| 29-Mar-2017| 13:05 \nwindowsbase.dll| 3.0.6920.8773| 1,118,208| 29-Mar-2017| 13:05 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,060,864| 11-Jun-2018| 22:12 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,519,616| 11-Jun-2018| 22:12 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 454,656| 11-Jun-2018| 22:12 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 29-Mar-2017| 13:05 \nreachframework.dll| 3.0.6920.8773| 532,480| 29-Mar-2017| 13:05 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 22:12 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 22:12 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 28-Nov-2017| 14:04 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 22:12 \nsystem.management.dll| 2.0.50727.8766| 389,120| 11-Jul-2017| 20:05 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:04 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.security.dll| 2.0.50727.8784| 274,432| 27-Mar-2018| 13:05 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 07-Apr-2017| 13:05 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 22:12 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 22:12 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 22:12 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 28-Nov-2017| 14:04 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 29-Mar-2017| 13:05 \nbig5.nlp| | 66,728| 16-Jun-2018| 05:11 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:11 \nksc.nlp| | 116,756| 16-Jun-2018| 05:11 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:12 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:12 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:12 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:12 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:12 \nprc.nlp| | 83,748| 16-Jun-2018| 05:12 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:12 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:12 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:12 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:13 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 07-Apr-2017| 13:05 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 16:53 \nwebengine.dll| 2.0.50727.8762| 437,400| 07-Apr-2017| 13:05 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 11-Jul-2017| 20:05 \npresentationcore.dll| 3.0.6920.8773| 4,222,976| 29-Mar-2017| 13:05 \npresentationfontcache.exe.config| | 161| 23-Mar-2016| 22:38 \nwpfgfx_v0300.dll| 3.0.6920.8773| 1,737,888| 29-Mar-2017| 13:05 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 06-Apr-2017| 13:05 \nsystem.printing.dll| 3.0.6920.8773| 372,736| 29-Mar-2017| 13:05 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 07-Apr-2017| 13:05 \nservicemodel.mof| | 85,113| 22-Jan-2018| 19:10 \nservicemodel.mof.uninstall| | 896| 22-Jan-2018| 19:10 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 22:12 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \npenimc.dll| 3.0.6920.8773| 68,752| 29-Mar-2017| 13:05 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 29-Mar-2017| 13:05 \npresentationhostdll.dll| 3.0.6920.8773| 131,248| 29-Mar-2017| 13:05 \nreachframework.dll| 3.0.6920.8773| 532,480| 29-Mar-2017| 13:05 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 29-Mar-2017| 13:05 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 22:12 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 22:12 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 22:12 \n**For all supported IA64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 16-Jun-2018| 05:14 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:14 \nksc.nlp| | 116,756| 16-Jun-2018| 05:14 \nmscorlib.dll| 2.0.50727.8793| 4,014,080| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:14 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:14 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:14 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:14 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:14 \nprc.nlp| | 83,748| 16-Jun-2018| 05:14 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:14 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:14 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:14 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:15 \naspnet_wp.exe| 2.0.50727.8762| 83,096| 07-Apr-2017| 13:05 \nmscordacwks.dll| 2.0.50727.8793| 3,083,400| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 602,752| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 20,404,864| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 873,592| 24-Jul-2018| 16:53 \nsystem.data.sqlxml.dll| 2.0.50727.8781| 745,472| 31-Dec-2017| 23:52 \nsystem.management.dll| 2.0.50727.8766| 389,120| 11-Jul-2017| 20:05 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:04 \nsystem.security.dll| 2.0.50727.8784| 274,432| 27-Mar-2018| 13:05 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 07-Apr-2017| 13:05 \nsystem.xml.dll| 2.0.50727.8781| 2,056,192| 31-Dec-2017| 23:52 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nwebengine.dll| 2.0.50727.8762| 1,233,560| 07-Apr-2017| 13:05 \nwminet_utils.dll| 2.0.50727.8766| 290,976| 11-Jul-2017| 20:05 \nsystem.data.dll| 2.0.50727.8762| 3,310,592| 06-Apr-2017| 13:05 \nsystem.web.dll| 2.0.50727.8762| 4,816,896| 07-Apr-2017| 13:05 \nservicemodel.mof| | 85,113| 04-May-2018| 22:04 \nservicemodel.mof.uninstall| | 896| 04-May-2018| 22:04 \nservicemonikersupport.dll| 3.0.4506.8800| 34,480| 11-Jun-2018| 22:12 \nsmdiagnostics.dll| 3.0.4506.8800| 94,208| 11-Jun-2018| 22:12 \nsmsvchost.exe| 3.0.4506.8800| 117,376| 11-Jun-2018| 22:12 \nsystem.identitymodel.dll| 3.0.4506.8800| 405,504| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 22:12 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 22:12 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,060,864| 11-Jun-2018| 22:12 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,519,616| 11-Jun-2018| 22:12 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 454,656| 11-Jun-2018| 22:12 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 22:12 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 22:12 \nsystem.data.sqlxml.dll| 2.0.50727.8781| 745,472| 31-Dec-2017| 23:51 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 22:12 \nsystem.management.dll| 2.0.50727.8766| 389,120| 11-Jul-2017| 20:05 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 31-Aug-2017| 13:04 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.security.dll| 2.0.50727.8784| 274,432| 27-Mar-2018| 13:05 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 07-Apr-2017| 13:05 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 22:12 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 22:12 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 22:12 \nsystem.xml.dll| 2.0.50727.8781| 2,056,192| 31-Dec-2017| 23:51 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nbig5.nlp| | 66,728| 16-Jun-2018| 05:11 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:11 \nksc.nlp| | 116,756| 16-Jun-2018| 05:11 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:12 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:12 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:12 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:12 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:12 \nprc.nlp| | 83,748| 16-Jun-2018| 05:12 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:12 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:12 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:12 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:13 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 07-Apr-2017| 13:05 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 16:53 \nwebengine.dll| 2.0.50727.8762| 437,400| 07-Apr-2017| 13:05 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 11-Jul-2017| 20:05 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 06-Apr-2017| 13:05 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 07-Apr-2017| 13:05 \nservicemodel.mof| | 85,113| 22-Jan-2018| 19:10 \nservicemodel.mof.uninstall| | 896| 22-Jan-2018| 19:10 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 22:12 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 22:12 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 22:12 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 22:12 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 22:12 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 22:12 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 22:12 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 3.5.1 for Windows 7 SP1 and Windows Server 2008 R2 SP1 (KB 4344152)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344152", "href": "https://support.microsoft.com/en-us/help/4344152", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:13:59", "description": "None\n## Summary\n\nThis update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update [2919355](<https://support.microsoft.com/en-us/help/2919355>) to be installed. We recommend that you install update [2919355](<https://support.microsoft.com/en-us/help/2919355>) on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2, see the following article in the Microsoft Knowledge Base:[4345592](<https://support.microsoft.com/help/4345592>) Security and Quality Rollup updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4345592)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345592** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces previously released updates [4340558](<https://support.microsoft.com/help/4340558>) and [4291497](<https://support.microsoft.com/help/4291497>). \n\n### \n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8.1-KB4344145-arm.msu| 79E7BCA34766841838888F6D1CF14E1A7F2EECA2| E22A403C70B93809CB05BB1EE20E1815678C16606F5140DB3618587D82932774 \nWindows8.1-KB4344145-x64.msu| 3A78DEA3BDA5A3C8F65BAEB2C27DECF4563D6359| 3FBB3C24C72C791532D3916EDA8F8E5A0765E959E34118F96CABECC79BBB184A \nWindows8.1-KB4344145-x86.msu| 7D19DF08FB4D7CE730FE81081781E90CB72572FE| 16253BAF2788050BD5DA987CC03EB6BD05A902239A417810E62B31998BB144FD \n \n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \npresentationframework.dll| 4.7.2672.0| 6,210,896| 19-Jul-2018| 22:47 \nsmdiagnostics.dll| 4.7.3130.0| 73,808| 06-Jun-2018| 06:16 \nsystem.activities.dll| 4.7.3130.0| 1,532,544| 06-Jun-2018| 06:16 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.data.sqlxml.dll| 4.7.2612.0| 734,400| 22-Nov-2017| 20:59 \nsystem.deployment.dll| 4.6.1099.0| 846,016| 27-Mar-2017| 03:33 \nsystem.directoryservices.accountmanagement.dll| 4.7.2623.0| 296,216| 30-Nov-2017| 04:16 \nsystem.directoryservices.protocols.dll| 4.6.1099.0| 200,488| 27-Mar-2017| 03:33 \nsystem.drawing.dll| 4.6.1099.0| 594,616| 27-Mar-2017| 03:33 \nsystem.identitymodel.services.dll| 4.7.3130.0| 198,376| 06-Jun-2018| 06:16 \nsystem.identitymodel.dll| 4.7.3130.0| 1,090,176| 06-Jun-2018| 06:16 \nsystem.management.dll| 4.7.2102.0| 415,432| 06-Jun-2017| 23:17 \nsystem.net.http.dll| 4.7.2634.0| 203,352| 02-Feb-2018| 21:11 \nsystem.runtime.caching.dll| 4.6.1649.1| 108,920| 21-Apr-2017| 05:35 \nsystem.runtime.remoting.dll| 4.7.2114.0| 347,368| 30-Aug-2017| 06:04 \nsystem.runtime.serialization.dll| 4.7.3130.0| 1,056,456| 06-Jun-2018| 06:16 \nsystem.security.dll| 4.7.2650.0| 324,696| 21-Mar-2018| 04:49 \nsystem.servicemodel.channels.dll| 4.7.3130.0| 157,928| 06-Jun-2018| 06:16 \nsystem.servicemodel.discovery.dll| 4.7.3130.0| 308,456| 06-Jun-2018| 06:16 \nsystem.servicemodel.internals.dll| 4.7.3130.0| 260,808| 06-Jun-2018| 06:16 \nsystem.servicemodel.routing.dll| 4.6.1099.0| 130,288| 27-Mar-2017| 03:33 \nsystem.servicemodel.washosting.dll| 4.7.3130.0| 39,656| 06-Jun-2018| 06:16 \nsystem.servicemodel.dll| 4.7.3130.0| 6,321,784| 06-Jun-2018| 06:16 \nsystem.web.applicationservices.dll| 4.7.2623.0| 70,912| 30-Nov-2017| 04:16 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nsystem.windows.controls.ribbon.dll| 4.7.2672.0| 742,608| 19-Jul-2018| 22:47 \nsystem.windows.forms.dll| 4.7.2114.0| 5,181,656| 30-Aug-2017| 06:04 \nsystem.workflow.activities.dll| 4.7.3130.0| 1,051,360| 06-Jun-2018| 06:16 \nsystem.workflow.componentmodel.dll| 4.7.3130.0| 1,542,384| 06-Jun-2018| 06:16 \nsystem.workflow.runtime.dll| 4.7.3130.0| 498,896| 06-Jun-2018| 06:16 \nsystem.xaml.dll| 4.7.2672.0| 643,560| 19-Jul-2018| 22:47 \nsystem.xml.dll| 4.7.2612.0| 2,670,224| 22-Nov-2017| 20:59 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nuiautomationclientsideproviders.dll| 4.7.2672.0| 361,336| 19-Jul-2018| 22:47 \nuiautomationclient.dll| 4.7.2672.0| 177,984| 19-Jul-2018| 22:47 \nuiautomationprovider.dll| 4.7.2672.0| 48,968| 19-Jul-2018| 22:47 \nuiautomationtypes.dll| 4.7.2672.0| 220,992| 19-Jul-2018| 22:47 \nwindowsbase.dll| 4.7.2672.0| 1,289,512| 19-Jul-2018| 22:47 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 25-Jul-2018| 02:50 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \naspnet_perf.dll| 4.7.2623.0| 42,648| 30-Nov-2017| 04:16 \naspnet_state_perf.h| | 318| 30-Nov-2017| 02:23 \naspnet_state_perf.ini| | 42,996| 30-Nov-2017| 04:18 \naspnet_wp.exe| 4.7.2623.0| 46,176| 30-Nov-2017| 04:16 \nclrjit.dll| 4.7.3133.0| 524,288| 25-Jul-2018| 02:50 \nclr.dll| 4.7.3133.0| 7,249,400| 25-Jul-2018| 02:50 \ndfdll.dll| 4.6.1099.0| 154,768| 27-Mar-2017| 03:33 \nglobalmonospace.compositefont| | 26,040| 17-May-2018| 04:37 \nglobalsansserif.compositefont| | 26,489| 17-May-2018| 04:37 \nglobalserif.compositefont| | 29,779| 17-May-2018| 04:37 \nglobaluserinterface.compositefont| | 186,009| 19-Jul-2018| 19:11 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 25-Jul-2018| 02:50 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 25-Jul-2018| 02:50 \nmscoreei.dll| 4.6.1099.0| 497,824| 27-Mar-2017| 03:33 \nmscorlib.ni.dll| 4.7.3133.0| 20,528,720| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 11-May-2018| 01:43 \npenimc.dll| 14.7.2634.0| 19,096| 02-Feb-2018| 21:11 \npenimc2_v0400.dll| 4.7.2672.0| 86,160| 19-Jul-2018| 22:47 \npenimc_v0400.dll| 4.7.2634.0| 24,728| 02-Feb-2018| 21:11 \npeverify.dll| 4.7.3133.0| 189,960| 25-Jul-2018| 02:50 \npresentationhost_v0400.dll.mui| 4.7.2672.0| 84,704| 19-Jul-2018| 22:47 \npresentationhost_v0400.dll| 4.7.2672.0| 214,200| 19-Jul-2018| 22:47 \npresentationnative_v0400.dll| 4.7.2672.0| 827,096| 19-Jul-2018| 22:47 \nservicemodel.mof| | 88,383| 11-May-2018| 01:26 \nservicemodel.mof.uninstall| | 896| 11-May-2018| 01:26 \nservicemonikersupport.dll| 4.7.3130.0| 29,384| 06-Jun-2018| 06:16 \nsos.dll| 4.7.3133.0| 744,952| 25-Jul-2018| 02:50 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nwebengine4.dll| 4.7.2623.0| 550,032| 30-Nov-2017| 04:16 \nwebengine.dll| 4.7.2623.0| 24,712| 30-Nov-2017| 04:16 \nwminet_utils.dll| 4.7.2102.0| 136,368| 06-Jun-2017| 23:17 \nworkflowservicehostperformancecounters.dll| 4.7.3130.0| 89,384| 06-Jun-2018| 06:16 \nwpfgfx_v0400.dll| 4.7.2672.0| 1,345,160| 19-Jul-2018| 22:47 \npresentationcore.dll| 4.7.2672.0| 3,635,024| 19-Jul-2018| 22:47 \nsystem.data.dll| 4.7.2623.0| 3,397,272| 30-Nov-2017| 04:16 \nsystem.transactions.dll| 4.6.1099.0| 303,824| 27-Mar-2017| 03:33 \nsystem.web.dll| 4.7.2623.0| 5,409,936| 30-Nov-2017| 04:16 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.7.3133.0| 5,420,992| 25-Jul-2018| 02:09 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \naspnet_perf.dll| 4.7.2623.0| 46,232| 30-Nov-2017| 04:12 \naspnet_state_perf.h| | 318| 30-Nov-2017| 02:05 \naspnet_state_perf.ini| | 42,996| 30-Nov-2017| 04:12 \naspnet_wp.exe| 4.7.2623.0| 50,784| 30-Nov-2017| 04:12 \nclrjit.dll| 4.7.3133.0| 1,227,192| 25-Jul-2018| 02:09 \nclr.dll| 4.7.3133.0| 10,378,664| 25-Jul-2018| 02:09 \ncompatjit.dll| 4.7.3133.0| 1,262,528| 25-Jul-2018| 02:09 \ndfdll.dll| 4.6.1099.0| 181,400| 27-Mar-2017| 03:29 \nglobalmonospace.compositefont| | 26,040| 17-May-2018| 04:37 \nglobalsansserif.compositefont| | 26,489| 17-May-2018| 04:37 \nglobalserif.compositefont| | 29,779| 17-May-2018| 04:37 \nglobaluserinterface.compositefont| | 186,009| 19-Jul-2018| 19:11 \nmscordacwks.dll| 4.7.3133.0| 1,843,656| 25-Jul-2018| 02:09 \nmscordbi.dll| 4.7.3133.0| 1,625,024| 25-Jul-2018| 02:09 \nmscoreei.dll| 4.6.1099.0| 617,632| 27-Mar-2017| 03:29 \nmscorlib.ni.dll| 4.7.3133.0| 22,590,008| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52519.0| 690,008| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 993,632| 11-May-2018| 01:43 \npenimc.dll| 14.7.2634.0| 19,096| 02-Feb-2018| 21:04 \npenimc2_v0400.dll| 4.7.2672.0| 107,472| 19-Jul-2018| 22:39 \npenimc_v0400.dll| 4.7.2634.0| 25,760| 02-Feb-2018| 21:04 \npeverify.dll| 4.7.3133.0| 263,104| 25-Jul-2018| 02:09 \npresentationframework.dll| 4.7.2672.0| 6,210,896| 19-Jul-2018| 22:47 \npresentationhost_v0400.dll.mui| 4.7.2672.0| 87,560| 19-Jul-2018| 22:39 \npresentationhost_v0400.dll| 4.7.2672.0| 280,568| 19-Jul-2018| 22:39 \npresentationnative_v0400.dll| 4.7.2672.0| 1,112,576| 19-Jul-2018| 22:39 \nservicemodel.mof| | 88,383| 21-Feb-2018| 03:54 \nservicemodel.mof.uninstall| | 896| 21-Feb-2018| 03:54 \nservicemonikersupport.dll| 4.7.3130.0| 31,456| 06-Jun-2018| 06:09 \nsmdiagnostics.dll| 4.7.3130.0| 73,808| 06-Jun-2018| 06:16 \nsos.dll| 4.7.3133.0| 874,920| 25-Jul-2018| 02:09 \nsystem.activities.dll| 4.7.3130.0| 1,532,544| 06-Jun-2018| 06:16 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.data.sqlxml.dll| 4.7.2612.0| 734,400| 22-Nov-2017| 20:59 \nsystem.deployment.dll| 4.6.1099.0| 846,016| 27-Mar-2017| 03:33 \nsystem.directoryservices.accountmanagement.dll| 4.7.2623.0| 296,216| 30-Nov-2017| 04:16 \nsystem.directoryservices.protocols.dll| 4.6.1099.0| 200,488| 27-Mar-2017| 03:33 \nsystem.drawing.dll| 4.6.1099.0| 594,616| 27-Mar-2017| 03:33 \nsystem.identitymodel.services.dll| 4.7.3130.0| 198,376| 06-Jun-2018| 06:16 \nsystem.identitymodel.dll| 4.7.3130.0| 1,090,176| 06-Jun-2018| 06:16 \nsystem.management.dll| 4.7.2102.0| 415,432| 06-Jun-2017| 23:17 \nsystem.net.http.dll| 4.7.2634.0| 203,352| 02-Feb-2018| 21:11 \nsystem.runtime.caching.dll| 4.6.1649.1| 108,920| 21-Apr-2017| 05:35 \nsystem.runtime.remoting.dll| 4.7.2114.0| 347,368| 30-Aug-2017| 06:04 \nsystem.runtime.serialization.dll| 4.7.3130.0| 1,056,456| 06-Jun-2018| 06:16 \nsystem.security.dll| 4.7.2650.0| 324,696| 21-Mar-2018| 04:49 \nsystem.servicemodel.channels.dll| 4.7.3130.0| 157,928| 06-Jun-2018| 06:16 \nsystem.servicemodel.discovery.dll| 4.7.3130.0| 308,456| 06-Jun-2018| 06:16 \nsystem.servicemodel.internals.dll| 4.7.3130.0| 260,808| 06-Jun-2018| 06:16 \nsystem.servicemodel.routing.dll| 4.6.1099.0| 130,288| 27-Mar-2017| 03:33 \nsystem.servicemodel.washosting.dll| 4.7.3130.0| 39,656| 06-Jun-2018| 06:16 \nsystem.servicemodel.dll| 4.7.3130.0| 6,321,784| 06-Jun-2018| 06:16 \nsystem.web.applicationservices.dll| 4.7.2623.0| 70,912| 30-Nov-2017| 04:16 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nsystem.windows.controls.ribbon.dll| 4.7.2672.0| 742,608| 19-Jul-2018| 22:47 \nsystem.windows.forms.dll| 4.7.2114.0| 5,181,656| 30-Aug-2017| 06:04 \nsystem.workflow.activities.dll| 4.7.3130.0| 1,051,360| 06-Jun-2018| 06:16 \nsystem.workflow.componentmodel.dll| 4.7.3130.0| 1,542,384| 06-Jun-2018| 06:16 \nsystem.workflow.runtime.dll| 4.7.3130.0| 498,896| 06-Jun-2018| 06:16 \nsystem.xaml.dll| 4.7.2672.0| 643,560| 19-Jul-2018| 22:47 \nsystem.xml.dll| 4.7.2612.0| 2,670,224| 22-Nov-2017| 20:59 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nuiautomationclientsideproviders.dll| 4.7.2672.0| 361,336| 19-Jul-2018| 22:47 \nuiautomationclient.dll| 4.7.2672.0| 177,984| 19-Jul-2018| 22:47 \nuiautomationprovider.dll| 4.7.2672.0| 48,968| 19-Jul-2018| 22:47 \nuiautomationtypes.dll| 4.7.2672.0| 220,992| 19-Jul-2018| 22:47 \nwebengine4.dll| 4.7.2623.0| 667,792| 30-Nov-2017| 04:12 \nwebengine.dll| 4.7.2623.0| 26,256| 30-Nov-2017| 04:12 \nwindowsbase.dll| 4.7.2672.0| 1,289,512| 19-Jul-2018| 22:47 \nwminet_utils.dll| 4.7.2102.0| 188,088| 06-Jun-2017| 23:13 \nworkflowservicehostperformancecounters.dll| 4.7.3130.0| 101,136| 06-Jun-2018| 06:09 \nwpfgfx_v0400.dll| 4.7.2672.0| 1,766,864| 19-Jul-2018| 22:39 \npresentationcore.dll| 4.7.2672.0| 3,613,760| 19-Jul-2018| 22:39 \nsystem.data.dll| 4.7.2623.0| 3,461,784| 30-Nov-2017| 04:12 \nsystem.transactions.dll| 4.6.1099.0| 306,888| 27-Mar-2017| 03:29 \nsystem.web.dll| 4.7.2623.0| 5,397,136| 30-Nov-2017| 04:12 \npresentationframework.dll| 4.7.2672.0| 6,210,896| 19-Jul-2018| 22:47 \nsmdiagnostics.dll| 4.7.3130.0| 73,808| 06-Jun-2018| 06:16 \nsystem.activities.dll| 4.7.3130.0| 1,532,544| 06-Jun-2018| 06:16 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.data.sqlxml.dll| 4.7.2612.0| 734,400| 22-Nov-2017| 20:59 \nsystem.deployment.dll| 4.6.1099.0| 846,016| 27-Mar-2017| 03:33 \nsystem.directoryservices.accountmanagement.dll| 4.7.2623.0| 296,216| 30-Nov-2017| 04:16 \nsystem.directoryservices.protocols.dll| 4.6.1099.0| 200,488| 27-Mar-2017| 03:33 \nsystem.drawing.dll| 4.6.1099.0| 594,616| 27-Mar-2017| 03:33 \nsystem.identitymodel.services.dll| 4.7.3130.0| 198,376| 06-Jun-2018| 06:16 \nsystem.identitymodel.dll| 4.7.3130.0| 1,090,176| 06-Jun-2018| 06:16 \nsystem.management.dll| 4.7.2102.0| 415,432| 06-Jun-2017| 23:17 \nsystem.net.http.dll| 4.7.2634.0| 203,352| 02-Feb-2018| 21:11 \nsystem.runtime.caching.dll| 4.6.1649.1| 108,920| 21-Apr-2017| 05:35 \nsystem.runtime.remoting.dll| 4.7.2114.0| 347,368| 30-Aug-2017| 06:04 \nsystem.runtime.serialization.dll| 4.7.3130.0| 1,056,456| 06-Jun-2018| 06:16 \nsystem.security.dll| 4.7.2650.0| 324,696| 21-Mar-2018| 04:49 \nsystem.servicemodel.channels.dll| 4.7.3130.0| 157,928| 06-Jun-2018| 06:16 \nsystem.servicemodel.discovery.dll| 4.7.3130.0| 308,456| 06-Jun-2018| 06:16 \nsystem.servicemodel.internals.dll| 4.7.3130.0| 260,808| 06-Jun-2018| 06:16 \nsystem.servicemodel.routing.dll| 4.6.1099.0| 130,288| 27-Mar-2017| 03:33 \nsystem.servicemodel.washosting.dll| 4.7.3130.0| 39,656| 06-Jun-2018| 06:16 \nsystem.servicemodel.dll| 4.7.3130.0| 6,321,784| 06-Jun-2018| 06:16 \nsystem.web.applicationservices.dll| 4.7.2623.0| 70,912| 30-Nov-2017| 04:16 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nsystem.windows.controls.ribbon.dll| 4.7.2672.0| 742,608| 19-Jul-2018| 22:47 \nsystem.windows.forms.dll| 4.7.2114.0| 5,181,656| 30-Aug-2017| 06:04 \nsystem.workflow.activities.dll| 4.7.3130.0| 1,051,360| 06-Jun-2018| 06:16 \nsystem.workflow.componentmodel.dll| 4.7.3130.0| 1,542,384| 06-Jun-2018| 06:16 \nsystem.workflow.runtime.dll| 4.7.3130.0| 498,896| 06-Jun-2018| 06:16 \nsystem.xaml.dll| 4.7.2672.0| 643,560| 19-Jul-2018| 22:47 \nsystem.xml.dll| 4.7.2612.0| 2,670,224| 22-Nov-2017| 20:59 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \nuiautomationclientsideproviders.dll| 4.7.2672.0| 361,336| 19-Jul-2018| 22:47 \nuiautomationclient.dll| 4.7.2672.0| 177,984| 19-Jul-2018| 22:47 \nuiautomationprovider.dll| 4.7.2672.0| 48,968| 19-Jul-2018| 22:47 \nuiautomationtypes.dll| 4.7.2672.0| 220,992| 19-Jul-2018| 22:47 \nwindowsbase.dll| 4.7.2672.0| 1,289,512| 19-Jul-2018| 22:47 \nmscorlib.dll| 4.7.3133.0| 5,638,272| 25-Jul-2018| 02:50 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \naspnet_perf.dll| 4.7.2623.0| 42,648| 30-Nov-2017| 04:16 \naspnet_state_perf.h| | 318| 30-Nov-2017| 02:23 \naspnet_state_perf.ini| | 42,996| 30-Nov-2017| 04:18 \naspnet_wp.exe| 4.7.2623.0| 46,176| 30-Nov-2017| 04:16 \nclrjit.dll| 4.7.3133.0| 524,288| 25-Jul-2018| 02:50 \nclr.dll| 4.7.3133.0| 7,249,400| 25-Jul-2018| 02:50 \ndfdll.dll| 4.6.1099.0| 154,768| 27-Mar-2017| 03:33 \nglobalmonospace.compositefont| | 26,040| 17-May-2018| 04:37 \nglobalsansserif.compositefont| | 26,489| 17-May-2018| 04:37 \nglobalserif.compositefont| | 29,779| 17-May-2018| 04:37 \nglobaluserinterface.compositefont| | 186,009| 19-Jul-2018| 19:11 \nmscordacwks.dll| 4.7.3133.0| 1,345,992| 25-Jul-2018| 02:50 \nmscordbi.dll| 4.7.3133.0| 1,170,440| 25-Jul-2018| 02:50 \nmscoreei.dll| 4.6.1099.0| 497,824| 27-Mar-2017| 03:33 \nmscorlib.ni.dll| 4.7.3133.0| 20,528,720| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52519.0| 485,576| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52519.0| 987,840| 11-May-2018| 01:43 \npenimc.dll| 14.7.2634.0| 19,096| 02-Feb-2018| 21:11 \npenimc2_v0400.dll| 4.7.2672.0| 86,160| 19-Jul-2018| 22:47 \npenimc_v0400.dll| 4.7.2634.0| 24,728| 02-Feb-2018| 21:11 \npeverify.dll| 4.7.3133.0| 189,960| 25-Jul-2018| 02:50 \npresentationhost_v0400.dll.mui| 4.7.2672.0| 84,704| 19-Jul-2018| 22:47 \npresentationhost_v0400.dll| 4.7.2672.0| 214,200| 19-Jul-2018| 22:47 \npresentationnative_v0400.dll| 4.7.2672.0| 827,096| 19-Jul-2018| 22:47 \nservicemonikersupport.dll| 4.7.3130.0| 29,384| 06-Jun-2018| 06:16 \nsos.dll| 4.7.3133.0| 744,952| 25-Jul-2018| 02:50 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.entity.dll| 4.7.2102.0| 4,033,744| 06-Jun-2017| 23:17 \nsystem.web.extensions.dll| 4.7.2623.0| 1,849,544| 30-Nov-2017| 04:16 \nwebengine4.dll| 4.7.2623.0| 550,032| 30-Nov-2017| 04:16 \nwebengine.dll| 4.7.2623.0| 24,712| 30-Nov-2017| 04:16 \nwminet_utils.dll| 4.7.2102.0| 136,368| 06-Jun-2017| 23:17 \nworkflowservicehostperformancecounters.dll| 4.7.3130.0| 89,384| 06-Jun-2018| 06:16 \nwpfgfx_v0400.dll| 4.7.2672.0| 1,345,160| 19-Jul-2018| 22:47 \npresentationcore.dll| 4.7.2672.0| 3,635,024| 19-Jul-2018| 22:47 \nsystem.data.dll| 4.7.2623.0| 3,397,272| 30-Nov-2017| 04:16 \nsystem.transactions.dll| 4.6.1099.0| 303,824| 27-Mar-2017| 03:33 \nsystem.web.dll| 4.7.2623.0| 5,409,936| 30-Nov-2017| 04:16 \n**For all supported ARM-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.7.3133.0| 5,639,048| 25-Jul-2018| 02:09 \nnormidna.nlp| | 59,342| 02-Nov-2017| 02:14 \nnormnfc.nlp| | 47,076| 02-Nov-2017| 02:14 \nnormnfd.nlp| | 40,566| 02-Nov-2017| 02:14 \nnormnfkc.nlp| | 67,808| 02-Nov-2017| 02:14 \nnormnfkd.nlp| | 61,718| 02-Nov-2017| 02:14 \nclrjit.dll| 4.7.3133.0| 686,976| 25-Jul-2018| 02:09 \nclr.dll| 4.7.3133.0| 6,759,800| 25-Jul-2018| 02:09 \nmscordacwks.dll| 4.7.3133.0| 1,296,792| 25-Jul-2018| 02:09 \nmscordbi.dll| 4.7.3133.0| 1,131,920| 25-Jul-2018| 02:09 \nmscoreei.dll| 4.6.1099.0| 514,544| 27-Mar-2017| 03:27 \nmscorlib.ni.dll| 4.7.3133.0| 20,717,104| 25-Jul-2018| 02:50 \nmsvcp120_clr0400.dll| 12.0.52242.36242| 602,080| 11-May-2018| 01:43 \nmsvcr120_clr0400.dll| 12.0.52242.36242| 634,336| 11-May-2018| 01:43 \nsos.dll| 4.7.3133.0| 648,568| 25-Jul-2018| 02:09 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nwminet_utils.dll| 4.7.2102.0| 110,592| 06-Jun-2017| 23:10 \nworkflowservicehostperformancecounters.dll| 4.7.3130.0| 72,720| 06-Jun-2018| 06:08 \nsystem.data.dll| 4.7.2623.0| 3,389,936| 30-Nov-2017| 04:09 \nsystem.transactions.dll| 4.6.1099.0| 304,152| 27-Mar-2017| 03:27 \nsystem.web.dll| 4.7.2623.0| 5,411,304| 30-Nov-2017| 04:09 \nsmdiagnostics.dll| 4.7.3130.0| 73,808| 06-Jun-2018| 06:16 \nsystem.activities.dll| 4.7.3130.0| 1,532,544| 06-Jun-2018| 06:16 \nsystem.componentmodel.dataannotations.dll| 4.6.1099.0| 125,760| 27-Mar-2017| 03:33 \nsystem.core.dll| 4.7.2672.0| 1,485,144| 19-Jul-2018| 22:47 \nsystem.data.sqlxml.dll| 4.7.2612.0| 734,400| 22-Nov-2017| 20:59 \nsystem.deployment.dll| 4.6.1099.0| 846,016| 27-Mar-2017| 03:33 \nsystem.directoryservices.protocols.dll| 4.6.1099.0| 200,488| 27-Mar-2017| 03:33 \nsystem.drawing.dll| 4.6.1099.0| 594,616| 27-Mar-2017| 03:33 \nsystem.identitymodel.dll| 4.7.3130.0| 1,090,176| 06-Jun-2018| 06:16 \nsystem.management.dll| 4.7.2102.0| 415,432| 06-Jun-2017| 23:17 \nsystem.net.http.dll| 4.7.2634.0| 203,352| 02-Feb-2018| 21:11 \nsystem.runtime.remoting.dll| 4.7.2114.0| 347,368| 30-Aug-2017| 06:04 \nsystem.runtime.serialization.dll| 4.7.3130.0| 1,056,456| 06-Jun-2018| 06:16 \nsystem.security.dll| 4.7.2650.0| 324,696| 21-Mar-2018| 04:49 \nsystem.servicemodel.internals.dll| 4.7.3130.0| 260,808| 06-Jun-2018| 06:16 \nsystem.servicemodel.dll| 4.7.3130.0| 6,321,784| 06-Jun-2018| 06:16 \nsystem.web.applicationservices.dll| 4.7.2623.0| 70,912| 30-Nov-2017| 04:16 \nsystem.windows.forms.dll| 4.7.2114.0| 5,181,656| 30-Aug-2017| 06:04 \nsystem.xaml.dll| 4.7.2672.0| 643,560| 19-Jul-2018| 22:47 \nsystem.xml.dll| 4.7.2612.0| 2,670,224| 22-Nov-2017| 20:59 \nsystem.dll| 4.7.3151.0| 3,555,872| 10-Jul-2018| 06:53 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4344145)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344145", "href": "https://support.microsoft.com/en-us/help/4344145", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T22:44:40", "description": "<html><body><p>Resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments.</p><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.</p><p>To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.</p><p>This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360\" id=\"kb-link-2\" target=\"\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8360</a>.</div><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span><span><span><span>All updates for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 require the d3dcompiler_47.dll to be installed. We recommend that you install the included d3dcompiler_47.dll before you apply this update. For more information about the d3dcompiler_47.dll, see </span></span></span><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/4019990\" target=\"_blank\">KB 4019990</a><span><span><span>.</span></span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344177\" managed-link=\"\" target=\"_blank\">4344177</a> Description of the Security Only update for .NET Framework 3.5.1 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4344177)</span></li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344173\" managed-link=\"\" target=\"_blank\">4344173</a> Description of the Security Only update for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 (KB 4344173)</li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344167\" managed-link=\"\" target=\"_blank\">4344167</a> Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1, and for .NET Framework 4.6 for Server 2008 (KB 4344167)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-14T17:07:58", "type": "mskb", "title": "Security Only updates for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4345679)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T17:07:58", "id": "KB4345679", "href": "https://support.microsoft.com/en-us/help/4345679/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:04", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update [2919355](<https://support.microsoft.com/en-us/help/2919355>) to be installed. We recommend that you install update [2919355](<https://support.microsoft.com/en-us/help/2919355>) on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 8.1, Windows RT 8.1 and Windows Server 2012 R2, see the following article in the Microsoft Knowledge Base:[4345681](<https://support.microsoft.com/help/4345681>) Security Only updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4345681)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345681>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345681** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update does not replace any previously released update.\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8.1-KB4344171-arm.msu| 824446FC5239CED92236DA038DAB7518F4DB383E| F4F06A591AA8B7E1F44AFAFA078F62DA15BE632C5022B1901A128CDCAFAADAA6 \nWindows8.1-KB4344171-x64.msu| 09D8F42F5CD522E04ED17EDBCB65BE101F00577A| A547E0271E71F64D81F4D93F19C624DCA7DFE2E0FAF7B947FC482C78AAC04B75 \nWindows8.1-KB4344171-x86.msu| 992B183C68B90ABFC32338D64D1876DE0ADEAFCB| 72A8F27E6CCABEFA8C35BDF2940AB8BB7345CD668AF382D437C7500E4758D918 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nsystem.dll| 4.0.30319.36455| 3,488,792| 12-Jul-2018| 13:11 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 24-Jul-2018| 13:10 \nnormidna.nlp| | 59,342| 07-Nov-2017| 17:51 \nnormnfc.nlp| | 47,076| 07-Nov-2017| 17:51 \nnormnfd.nlp| | 40,566| 07-Nov-2017| 17:51 \nnormnfkc.nlp| | 67,808| 07-Nov-2017| 17:51 \nnormnfkd.nlp| | 61,718| 07-Nov-2017| 17:51 \nclrjit.dll| 4.0.30319.36460| 510,464| 24-Jul-2018| 13:10 \nclr.dll| 4.0.30319.36460| 6,939,640| 24-Jul-2018| 13:10 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 24-Jul-2018| 13:10 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 24-Jul-2018| 13:10 \nmscorlib.ni.dll| 4.0.30319.36460| 17,234,888| 24-Jul-2018| 13:10 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 24-Jul-2018| 13:10 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 24-Jul-2018| 13:10 \npeverify.dll| 4.0.30319.36460| 163,968| 24-Jul-2018| 13:10 \nsos.dll| 4.0.30319.36460| 762,472| 24-Jul-2018| 13:10 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.0.30319.36460| 5,219,968| 24-Jul-2018| 13:11 \nnormidna.nlp| | 59,342| 26-Oct-2017| 16:05 \nnormnfc.nlp| | 47,076| 26-Oct-2017| 16:05 \nnormnfd.nlp| | 40,566| 26-Oct-2017| 16:05 \nnormnfkc.nlp| | 67,808| 26-Oct-2017| 16:05 \nnormnfkd.nlp| | 61,718| 26-Oct-2017| 16:05 \nclrjit.dll| 4.0.30319.36460| 1,234,552| 24-Jul-2018| 13:11 \nclr.dll| 4.0.30319.36460| 10,070,120| 24-Jul-2018| 13:11 \nmscordacwks.dll| 4.0.30319.36460| 1,731,208| 24-Jul-2018| 13:11 \nmscordbi.dll| 4.0.30319.36460| 1,533,568| 24-Jul-2018| 13:11 \nmscorlib.ni.dll| 4.0.30319.36460| 22,687,296| 24-Jul-2018| 13:11 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 678,584| 24-Jul-2018| 13:11 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 869,536| 24-Jul-2018| 13:11 \npeverify.dll| 4.0.30319.36460| 225,920| 24-Jul-2018| 13:11 \nsos.dll| 4.0.30319.36460| 822,888| 24-Jul-2018| 13:11 \nsystem.dll| 4.0.30319.36455| 3,488,792| 12-Jul-2018| 13:13 \nsystem.dll| 4.0.30319.36455| 3,488,792| 12-Jul-2018| 13:11 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 24-Jul-2018| 13:10 \nnormidna.nlp| | 59,342| 07-Nov-2017| 17:51 \nnormnfc.nlp| | 47,076| 07-Nov-2017| 17:51 \nnormnfd.nlp| | 40,566| 07-Nov-2017| 17:51 \nnormnfkc.nlp| | 67,808| 07-Nov-2017| 17:51 \nnormnfkd.nlp| | 61,718| 07-Nov-2017| 17:51 \nclrjit.dll| 4.0.30319.36460| 510,464| 24-Jul-2018| 13:10 \nclr.dll| 4.0.30319.36460| 6,939,640| 24-Jul-2018| 13:10 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 24-Jul-2018| 13:10 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 24-Jul-2018| 13:10 \nmscorlib.ni.dll| 4.0.30319.36460| 17,234,888| 24-Jul-2018| 13:10 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 24-Jul-2018| 13:10 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 24-Jul-2018| 13:10 \npeverify.dll| 4.0.30319.36460| 163,968| 24-Jul-2018| 13:10 \nsos.dll| 4.0.30319.36460| 762,472| 24-Jul-2018| 13:10 \n**For all supported ARM-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.dll| 4.0.30319.36460| 5,270,184| 24-Jul-2018| 13:11 \nnormidna.nlp| | 59,342| 08-Nov-2017| 15:14 \nnormnfc.nlp| | 47,076| 08-Nov-2017| 15:14 \nnormnfd.nlp| | 40,566| 08-Nov-2017| 15:14 \nnormnfkc.nlp| | 67,808| 08-Nov-2017| 15:14 \nnormnfkd.nlp| | 61,718| 08-Nov-2017| 15:14 \nclrjit.dll| 4.0.30319.36460| 625,544| 24-Jul-2018| 13:11 \nclr.dll| 4.0.30319.36460| 7,099,800| 24-Jul-2018| 13:11 \nmscordacwks.dll| 4.0.30319.36460| 1,305,504| 24-Jul-2018| 13:11 \nmscordbi.dll| 4.0.30319.36460| 1,120,168| 24-Jul-2018| 13:11 \nmscorlib.ni.dll| 4.0.30319.36460| 17,567,416| 24-Jul-2018| 13:11 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 602,024| 24-Jul-2018| 13:11 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 634,288| 24-Jul-2018| 13:11 \nsos.dll| 4.0.30319.36460| 666,496| 24-Jul-2018| 13:11 \nsystem.dll| 4.0.30319.36455| 3,488,792| 12-Jul-2018| 13:11 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 4.5.2 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4344171)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344171", "href": "https://support.microsoft.com/en-us/help/4344171", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:00", "description": "None\n## Summary\n\nThis update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update [2919355](<https://support.microsoft.com/en-us/help/2919355>) to be installed. We recommend that you install update [2919355](<https://support.microsoft.com/en-us/help/2919355>) on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2, see the following article in the Microsoft Knowledge Base:[4345592](<https://support.microsoft.com/help/4345592>) Security and Quality Rollup updates for .NET Framework 3.5 SP1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4345592)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345592** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces previously released updates [4340558](<https://support.microsoft.com/help/4340558>) and [4291497](<https://support.microsoft.com/help/4291497>). \n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8.1-KB4344147-x64.msu| 73CD95E3B2697458001FDA69AEBB8891DDCAC168| DE42CB0B14093C8C04F63298B7FFD395CE4A0A1B810A3D89D941285000FC9401 \nWindows8.1-KB4344147-x86.msu| 67EBC9C75D9E080DD0A8D05B79D9B54256006DD2| 5568FCFFBC84A67A3D7DB7A18A66C51C2A5D0BBF7DE38B3D66CC338AFEEE4885 \n \n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:30 \nbig5.nlp| | 66,728| 21-Nov-2017| 07:23 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 07:23 \nksc.nlp| | 116,756| 21-Nov-2017| 07:23 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 07:23 \nprc.nlp| | 83,748| 21-Nov-2017| 07:23 \nprcp.nlp| | 83,748| 21-Nov-2017| 07:23 \nsortkey.nlp| | 262,148| 21-Nov-2017| 07:23 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 07:23 \nxjis.nlp| | 28,288| 21-Nov-2017| 07:23 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 21-Nov-2017| 07:23 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 07:23 \nksc.nlp| | 116,756| 21-Nov-2017| 07:23 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 07:23 \nprc.nlp| | 83,748| 21-Nov-2017| 07:23 \nprcp.nlp| | 83,748| 21-Nov-2017| 07:23 \nsortkey.nlp| | 262,148| 21-Nov-2017| 07:23 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 07:23 \nxjis.nlp| | 28,288| 21-Nov-2017| 07:23 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 15:10 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:30 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:30 \nbig5.nlp| | 66,728| 21-Nov-2017| 07:23 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 07:23 \nksc.nlp| | 116,756| 21-Nov-2017| 07:23 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 07:23 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 07:23 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 07:23 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 07:23 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 07:23 \nprc.nlp| | 83,748| 21-Nov-2017| 07:23 \nprcp.nlp| | 83,748| 21-Nov-2017| 07:23 \nsortkey.nlp| | 262,148| 21-Nov-2017| 07:23 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 07:23 \nxjis.nlp| | 28,288| 21-Nov-2017| 07:23 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 8.1, RT 8.1, and Windows Server 2012 R2 (KB 4344147)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344147", "href": "https://support.microsoft.com/en-us/help/4344147", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:02", "description": "None\n## Summary\n\nThis update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows Server 2008, see the following article in the Microsoft Knowledge Base:[4345593](<https://support.microsoft.com/help/4345593>) Security and Quality updates for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 for Windows Server 2008 SP2 (KB 4345593)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345593** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces previously released updates [4340559](<https://support.microsoft.com/help/4340559>) and [4291501](<https://support.microsoft.com/help/4291501>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows6.0-KB4344151-ia64.msu| 649A2F83AE89D6BDFDC71ACF4451D5F6364A301A| A715BA6DFCB80452DD4C95C454F41AE2F4E249B284D3EE9108E976C0F49AD57A \nWindows6.0-KB4344151-x64.msu| 9A1876FE31C0D20D4335A7829CD910BC7C491412| FA44072F14FB2E90A88D7E961F666D29EF0FBBB3EFF5A027714C1216FD649038 \nWindows6.0-KB4344151-x86.msu| 1878960CAB9D340FC7EC5FA8A7CF4460F6C562F6| 762D9F58572279E5104037DB27C2797B4F0A453569A8764734AF25D78D0BDF81 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nmscorlib.resources.dll| 2.0.50727.4016| 352,256| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 425,984| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 331,776| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 348,160| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 319,488| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 290,816| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 397,312| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:26 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 16-Nov-2017| 03:47 \nreachframework.dll| 3.0.6920.8773| 532,480| 16-Nov-2017| 03:47 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 13:07 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 13:07 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 28-Apr-2018| 13:08 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:07 \nsystem.management.dll| 2.0.50727.8766| 389,120| 16-Nov-2017| 03:47 \nsystem.resources.dll| 2.0.50727.4016| 241,664| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 204,800| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 294,912| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 221,184| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 204,800| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 233,472| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 196,608| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 266,240| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:26 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 16-Nov-2017| 03:47 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.security.dll| 2.0.50727.8784| 274,432| 28-Mar-2018| 13:11 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:07 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 16-Nov-2017| 03:47 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:07 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:07 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:07 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 28-Apr-2018| 13:08 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 16-Nov-2017| 03:47 \nbig5.nlp| | 66,728| 21-Nov-2017| 04:33 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:33 \nksc.nlp| | 116,756| 21-Nov-2017| 04:33 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:33 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:33 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:33 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:33 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:33 \nprc.nlp| | 83,748| 21-Nov-2017| 04:33 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:33 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:33 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:33 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:33 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 16-Nov-2017| 03:47 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \nwebengine.dll| 2.0.50727.8762| 437,400| 16-Nov-2017| 03:47 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 16-Nov-2017| 03:47 \npresentationcore.dll| 3.0.6920.8773| 4,222,976| 16-Nov-2017| 03:47 \npresentationfontcache.exe.config| | 161| 16-Nov-2017| 03:47 \nwpfgfx_v0300.dll| 3.0.6920.8773| 1,737,888| 16-Nov-2017| 03:47 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 16-Nov-2017| 03:47 \nsystem.printing.dll| 3.0.6920.8773| 372,736| 16-Nov-2017| 03:47 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 16-Nov-2017| 03:47 \nservicemodel.mof| | 85,113| 16-Nov-2017| 03:47 \nservicemodel.mof.uninstall| | 896| 16-Nov-2017| 03:47 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 13:07 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:07 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \npenimc.dll| 3.0.6920.8773| 68,752| 16-Nov-2017| 03:47 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 16-Nov-2017| 03:47 \npresentationhostdll.dll| 3.0.6920.8773| 131,248| 16-Nov-2017| 03:47 \nreachframework.dll| 3.0.6920.8773| 532,480| 16-Nov-2017| 03:47 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 16-Nov-2017| 03:47 \nxpsviewer.exe| 3.0.6920.8773| 299,648| 16-Nov-2017| 03:47 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:07 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:07 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:07 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 21-Nov-2017| 04:32 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:32 \nksc.nlp| | 116,756| 21-Nov-2017| 04:32 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:32 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:32 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:32 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:32 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:32 \nprc.nlp| | 83,748| 21-Nov-2017| 04:32 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:32 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:32 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:32 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:32 \naspnet_wp.exe| 2.0.50727.8762| 43,160| 16-Nov-2017| 03:47 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 15:10 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 28-Apr-2018| 13:08 \nsystem.management.dll| 2.0.50727.8766| 389,120| 16-Nov-2017| 03:47 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 16-Nov-2017| 03:47 \nsystem.security.dll| 2.0.50727.8784| 274,432| 28-Mar-2018| 18:26 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 16-Nov-2017| 03:47 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 28-Apr-2018| 13:08 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nwebengine.dll| 2.0.50727.8762| 746,648| 16-Nov-2017| 03:47 \nwminet_utils.dll| 2.0.50727.8766| 140,960| 16-Nov-2017| 03:47 \npresentationcore.dll| 3.0.6920.8773| 4,006,400| 16-Nov-2017| 03:47 \npresentationfontcache.exe.config| | 161| 16-Nov-2017| 03:47 \nwpfgfx_v0300.dll| 3.0.6920.8773| 2,256,032| 16-Nov-2017| 03:47 \nsystem.data.dll| 2.0.50727.8762| 3,150,336| 16-Nov-2017| 03:47 \nsystem.printing.dll| 3.0.6920.8773| 358,400| 16-Nov-2017| 03:47 \nsystem.web.dll| 2.0.50727.8762| 5,296,128| 16-Nov-2017| 03:47 \nservicemodel.mof| | 85,113| 16-Nov-2017| 03:47 \nservicemodel.mof.uninstall| | 896| 16-Nov-2017| 03:47 \nservicemonikersupport.dll| 3.0.4506.8800| 20,144| 11-Jun-2018| 13:07 \nsmdiagnostics.dll| 3.0.4506.8800| 94,208| 11-Jun-2018| 13:07 \nsmsvchost.exe| 3.0.4506.8800| 117,376| 11-Jun-2018| 13:07 \nsystem.identitymodel.dll| 3.0.4506.8800| 405,504| 11-Jun-2018| 13:07 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 13:07 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 13:07 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 13:07 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:07 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 13:07 \npenimc.dll| 3.0.6920.8773| 85,648| 16-Nov-2017| 03:47 \npresentationframework.dll| 3.0.6920.8773| 4,640,768| 16-Nov-2017| 03:47 \npresentationhostdll.dll| 3.0.6920.8773| 172,208| 16-Nov-2017| 03:47 \nreachframework.dll| 3.0.6920.8773| 532,480| 16-Nov-2017| 03:47 \nwindowsbase.dll| 3.0.6920.8773| 1,118,208| 16-Nov-2017| 03:47 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,060,864| 11-Jun-2018| 13:07 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,519,616| 11-Jun-2018| 13:07 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 454,656| 11-Jun-2018| 13:07 \nmscorlib.resources.dll| 2.0.50727.4016| 352,256| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 425,984| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 331,776| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 348,160| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 319,488| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 290,816| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 303,104| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 307,200| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 397,312| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 299,008| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:26 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:26 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 16-Nov-2017| 03:47 \nreachframework.dll| 3.0.6920.8773| 532,480| 16-Nov-2017| 03:47 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 13:07 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 13:07 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 28-Apr-2018| 13:08 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:07 \nsystem.management.dll| 2.0.50727.8766| 389,120| 16-Nov-2017| 03:47 \nsystem.resources.dll| 2.0.50727.4016| 241,664| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 204,800| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 294,912| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 221,184| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 204,800| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 233,472| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 196,608| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 208,896| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 266,240| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 200,704| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:26 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:26 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 16-Nov-2017| 03:47 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.security.dll| 2.0.50727.8784| 274,432| 28-Mar-2018| 13:11 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:07 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 16-Nov-2017| 03:47 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:07 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:07 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:07 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 28-Apr-2018| 13:08 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 16-Nov-2017| 03:47 \nbig5.nlp| | 66,728| 21-Nov-2017| 04:33 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:33 \nksc.nlp| | 116,756| 21-Nov-2017| 04:33 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:33 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:33 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:33 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:33 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:33 \nprc.nlp| | 83,748| 21-Nov-2017| 04:33 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:33 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:33 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:33 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:33 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 16-Nov-2017| 03:47 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \nwebengine.dll| 2.0.50727.8762| 437,400| 16-Nov-2017| 03:47 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 16-Nov-2017| 03:47 \npresentationcore.dll| 3.0.6920.8773| 4,222,976| 16-Nov-2017| 03:47 \npresentationfontcache.exe.config| | 161| 16-Nov-2017| 03:47 \nwpfgfx_v0300.dll| 3.0.6920.8773| 1,737,888| 16-Nov-2017| 03:47 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 16-Nov-2017| 03:47 \nsystem.printing.dll| 3.0.6920.8773| 372,736| 16-Nov-2017| 03:47 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 16-Nov-2017| 03:47 \nservicemodel.mof| | 85,113| 16-Nov-2017| 03:47 \nservicemodel.mof.uninstall| | 896| 16-Nov-2017| 03:47 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 13:07 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:07 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \npenimc.dll| 3.0.6920.8773| 68,752| 16-Nov-2017| 03:47 \npresentationframework.dll| 3.0.6920.8773| 5,283,840| 16-Nov-2017| 03:47 \npresentationhostdll.dll| 3.0.6920.8773| 131,248| 16-Nov-2017| 03:47 \nreachframework.dll| 3.0.6920.8773| 532,480| 16-Nov-2017| 03:47 \nwindowsbase.dll| 3.0.6920.8773| 1,257,472| 16-Nov-2017| 03:47 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:07 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:07 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:07 \n**For all supported IA64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 21-Nov-2017| 04:32 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:32 \nksc.nlp| | 116,756| 21-Nov-2017| 04:32 \nmscorlib.dll| 2.0.50727.8793| 4,014,080| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:32 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:32 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:32 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:32 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:32 \nprc.nlp| | 83,748| 21-Nov-2017| 04:32 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:32 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:32 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:32 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:32 \naspnet_wp.exe| 2.0.50727.8762| 83,096| 16-Nov-2017| 03:20 \nmscordacwks.dll| 2.0.50727.8793| 3,083,400| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 602,752| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 20,404,864| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 873,592| 24-Jul-2018| 15:10 \nsystem.data.sqlxml.dll| 2.0.50727.8781| 745,472| 31-Dec-2017| 23:56 \nsystem.management.dll| 2.0.50727.8766| 389,120| 16-Nov-2017| 03:20 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 16-Nov-2017| 03:20 \nsystem.security.dll| 2.0.50727.8784| 274,432| 28-Mar-2018| 13:11 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 16-Nov-2017| 03:20 \nsystem.xml.dll| 2.0.50727.8781| 2,056,192| 31-Dec-2017| 23:56 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nwebengine.dll| 2.0.50727.8762| 1,233,560| 16-Nov-2017| 03:20 \nwminet_utils.dll| 2.0.50727.8766| 290,976| 16-Nov-2017| 03:20 \nsystem.data.dll| 2.0.50727.8762| 3,310,592| 16-Nov-2017| 03:20 \nsystem.web.dll| 2.0.50727.8762| 4,816,896| 16-Nov-2017| 03:20 \nservicemodel.mof| | 85,113| 16-Nov-2017| 03:19 \nservicemodel.mof.uninstall| | 896| 16-Nov-2017| 03:19 \nservicemonikersupport.dll| 3.0.4506.8800| 34,480| 11-Jun-2018| 13:06 \nsmdiagnostics.dll| 3.0.4506.8800| 94,208| 11-Jun-2018| 13:06 \nsmsvchost.exe| 3.0.4506.8800| 117,376| 11-Jun-2018| 13:06 \nsystem.identitymodel.dll| 3.0.4506.8800| 405,504| 11-Jun-2018| 13:06 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 13:06 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 847,872| 11-Jun-2018| 13:06 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 13:06 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:06 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,332,992| 11-Jun-2018| 13:06 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,060,864| 11-Jun-2018| 13:06 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,519,616| 11-Jun-2018| 13:06 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 454,656| 11-Jun-2018| 13:06 \nmscorlib.resources.dll| 2.0.50727.4016| 315,392| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 311,296| 21-Mar-2018| 16:25 \nmscorlib.resources.dll| 2.0.50727.4016| 348,160| 21-Nov-2017| 04:32 \nmscorlib.resources.dll| 2.0.50727.4016| 319,488| 21-Mar-2018| 16:25 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:25 \nmscorlib.resources.dll| 2.0.50727.4016| 278,528| 21-Mar-2018| 16:25 \nsmdiagnostics.dll| 3.0.4506.8800| 110,592| 11-Jun-2018| 13:07 \nsmsvchost.exe| 3.0.4506.8800| 129,664| 11-Jun-2018| 13:07 \nsystem.data.sqlxml.dll| 2.0.50727.8773| 745,472| 28-Apr-2018| 13:08 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:07 \nsystem.management.dll| 2.0.50727.8766| 389,120| 16-Nov-2017| 03:47 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 212,992| 21-Mar-2018| 16:25 \nsystem.resources.dll| 2.0.50727.4016| 233,472| 21-Nov-2017| 04:32 \nsystem.resources.dll| 2.0.50727.4016| 217,088| 21-Mar-2018| 16:25 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:25 \nsystem.resources.dll| 2.0.50727.4016| 184,320| 21-Mar-2018| 16:25 \nsystem.runtime.remoting.dll| 2.0.50727.8771| 307,200| 16-Nov-2017| 03:47 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.security.dll| 2.0.50727.8784| 274,432| 28-Mar-2018| 13:11 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \nsystem.servicemodel.washosting.dll| 3.0.4506.8800| 32,768| 11-Jun-2018| 13:07 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \nsystem.web.regularexpressions.dll| 2.0.50727.8762| 98,304| 16-Nov-2017| 03:47 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:07 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:07 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:07 \nsystem.xml.dll| 2.0.50727.8773| 2,056,192| 28-Apr-2018| 13:08 \nsystem.dll| 2.0.50727.8791| 3,207,168| 12-Jul-2018| 00:35 \nbig5.nlp| | 66,728| 21-Nov-2017| 04:33 \nbopomofo.nlp| | 82,172| 21-Nov-2017| 04:33 \nksc.nlp| | 116,756| 21-Nov-2017| 04:33 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 15:10 \nnormidna.nlp| | 59,342| 21-Nov-2017| 04:33 \nnormnfc.nlp| | 45,794| 21-Nov-2017| 04:33 \nnormnfd.nlp| | 39,284| 21-Nov-2017| 04:33 \nnormnfkc.nlp| | 66,384| 21-Nov-2017| 04:33 \nnormnfkd.nlp| | 60,294| 21-Nov-2017| 04:33 \nprc.nlp| | 83,748| 21-Nov-2017| 04:33 \nprcp.nlp| | 83,748| 21-Nov-2017| 04:33 \nsortkey.nlp| | 262,148| 21-Nov-2017| 04:33 \nsorttbls.nlp| | 20,320| 21-Nov-2017| 04:33 \nxjis.nlp| | 28,288| 21-Nov-2017| 04:33 \naspnet_wp.exe| 2.0.50727.8762| 31,384| 16-Nov-2017| 03:47 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 15:10 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 15:10 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 15:10 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 15:10 \nwebengine.dll| 2.0.50727.8762| 437,400| 16-Nov-2017| 03:47 \nwminet_utils.dll| 2.0.50727.8766| 116,896| 16-Nov-2017| 03:47 \nsystem.data.dll| 2.0.50727.8762| 2,975,744| 16-Nov-2017| 03:47 \nsystem.web.dll| 2.0.50727.8762| 5,287,936| 16-Nov-2017| 03:47 \nservicemodel.mof| | 85,113| 16-Nov-2017| 03:47 \nservicemodel.mof.uninstall| | 896| 16-Nov-2017| 03:47 \nservicemonikersupport.dll| 3.0.4506.8800| 18,096| 11-Jun-2018| 13:07 \nsystem.identitymodel.dll| 3.0.4506.8800| 446,464| 11-Jun-2018| 13:07 \nsystem.runtime.serialization.dll| 3.0.4506.8800| 970,752| 11-Jun-2018| 13:07 \nsystem.servicemodel.dll| 3.0.4506.8800| 5,992,448| 11-Jun-2018| 13:07 \nsystem.workflow.activities.dll| 3.0.4203.8800| 1,142,784| 11-Jun-2018| 13:07 \nsystem.workflow.componentmodel.dll| 3.0.4203.8800| 1,630,208| 11-Jun-2018| 13:07 \nsystem.workflow.runtime.dll| 3.0.4203.8800| 540,672| 11-Jun-2018| 13:07 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 2.0 SP2 and 3.0 SP2 for Windows Server 2008 SP2 (KB 4344151)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344151", "href": "https://support.microsoft.com/en-us/help/4344151", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T22:36:21", "description": "<html><body><p>Resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments.</p><h2></h2><p>This article also applies to the following:</p><ul><li>Microsoft .NET Framework 3.5</li></ul><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.</p><p>To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.</p><p>This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360\" id=\"kb-link-2\" target=\"_blank\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8360</a>.</div><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span>All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update <a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/2919355\" target=\"_blank\">2919355</a> to be installed. We recommend that you install update <a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/2919355\" target=\"_blank\">2919355</a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future</span></span></span>.<span><span><span><span></span></span></span></span></li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.</span></div><div>\u00a0</div><ul><li><span><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344153\" managed-link=\"\" target=\"_blank\">4344153</a> Description of the Security and Quality Rollup for .NET Framework 3.5 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4344153)</span></li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344147\" managed-link=\"\" target=\"_blank\">4344147</a> Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 8.1, RT 8.1, and Windows Server 2012 R2 (KB 4344147)</li><li><a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/help/4344145\" managed-link=\"\" target=\"_blank\">4344145</a> Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4344145)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-14T17:07:56", "type": "mskb", "title": "Security and Quality Rollup updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4345592)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T17:07:56", "id": "KB4345592", "href": "https://support.microsoft.com/en-us/help/4345592/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-01-01T22:41:31", "description": "<html><body><p>Resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments.</p><h2></h2><p>This article also applies to the following:</p><ul><li>Microsoft .NET Framework 3.5</li></ul><h2>Summary</h2><div class=\"kb-summary-section section\"><p>This security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which\u00a0content from one stream can blend into another stream.</p><p>To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.</p><p>This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.</p>To learn more about this vulnerability, see <a data-content-id=\"\" data-content-type=\"\" href=\"https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360\" id=\"kb-link-2\" target=\"\">Microsoft Common Vulnerabilities and Exposures CVE-2018-8360</a>.</div><h2></h2><p><strong><span class=\"text-base\">Important</span></strong></p><ul><li><span><span><span>All updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update <a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/2919355\" target=\"_blank\">2919355</a> to be installed. We recommend that you install update <a data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/2919355\" target=\"_blank\">2919355</a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future</span></span></span>.</li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/en-us/library/hh825699\" managed-link=\"\" target=\"_blank\">Add language packs to Windows</a>.</li></ul><h2>Additional information about this security update</h2><div><span>The following articles contain additional information about this security\u00a0update as it relates to individual product versions.</span></div><div>\u00a0</div><ul><li><span><a href=\"https://support.microsoft.com/help/4344178\" managed-link=\"\">4344178</a> Description of the Security Only update for .NET Framework 3.5 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4344178)</span></li><li><a href=\"https://support.microsoft.com/help/4344171\" managed-link=\"\">4344171</a> Description of the Security Only update for .NET Framework 4.5.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4344171)</li><li><a href=\"https://support.microsoft.com/help/4344166\" managed-link=\"\">4344166</a> Description of the Security Only update for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1 and Server 2012 R2 (KB 4344166)</li></ul><h2>How to obtain help and support for this security update</h2><ul><li><span>Help for installing updates: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/en-us/help/12373/windows-update-faq\" managed-link=\"\" target=\"_blank\">Windows Update FAQ</a></span></li><li><span>Security solutions for IT professionals: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://technet.microsoft.com/security/bb980617.aspx\" managed-link=\"\" target=\"_blank\">TechNet Security Support and Troubleshooting</a></li><li><span>Help for protecting your Windows-based products and services from viruses and malware: </span><a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" managed-link=\"\" target=\"_blank\">Microsoft Secure</a></li><li><span>Local support according to your country: <a bookmark-id=\"\" data-content-id=\"\" data-content-type=\"\" href=\"http://support.microsoft.com\" managed-link=\"\" target=\"_blank\">International Support</a></span></li></ul></body></html>", "edition": 2, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-08-14T17:07:55", "type": "mskb", "title": "Security Only updates for .NET Framework 3.5, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 8.1, RT 8.1, and Server 2012 R2 (KB 4345681)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T17:07:55", "id": "KB4345681", "href": "https://support.microsoft.com/en-us/help/4345681/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:00", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1, see the following article in the Microsoft Knowledge Base:[4345590](<https://support.microsoft.com/help/4345590>) Security and Quality Rollup updates for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4345590)For more information about this security update as it relates to Windows Server 2008 SP2, see the following article in the Microsoft Knowledge Base:[4345593](<https://support.microsoft.com/help/4345593>) Security and Quality updates for .NET Framework 2.0 SP2, 3.0 SP2, 4.5.2, and 4.6 for Windows Server 2008 SP2 (KB 4345593)\n\n## How to obtain and install the update\n\n### Method 1: Windows Update\n\nThis update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345590** for Windows 7 SP1 and Windows Server 2008 R2 SP1 or type **4345593** for Windows Server 2008 SP2 in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nFor Windows 7 SP1 and Windows Server 2008 R2 SP1, this update replaces previously released updates [4340556](<https://support.microsoft.com/help/4340556>) and [4291493](<https://support.microsoft.com/help/4291493>).For Windows Server 2008, this update replaces previously released updates [4340559](<https://support.microsoft.com/help/4340559>) and [4291501](<https://support.microsoft.com/help/4291501>). \n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nNDP45-KB4344149-x64.exe| 138A3B13CB3621002ABAA6AA858A02835FFB0C9E| 514277135C540AE42C570A6FDBD1F1B782C45B917C276CAB881942B21865F3BC \nNDP45-KB4344149-x86.exe| DCA12BE5B6FB5E7D6728D7477D0BA8EC193B451B| 56519C415E2211AF02E9D8C55986D3A88F90E49B4F263F61F8190EC75988670D \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nSystem.Web.DataVisualization.dll| 4.0.30319.36415| 1,713,560| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.Activities.Compiler.dll| 12.0.52415.36415| 3,194,664| 27-Jul-2018| 21:39 \nvbc.exe| 12.0.52415.36415| 2,459,256| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.Activities.CompilerUI.dll| 12.0.52415.36415| 272,184| 27-Jul-2018| 21:39 \nvbc7ui.dll| 12.0.52415.36415| 271,512| 27-Jul-2018| 21:39 \nAccessibility.dll| 4.0.30319.36415| 36,008| 27-Jul-2018| 21:39 \nAddInProcess.exe| 4.0.30319.36415| 42,104| 27-Jul-2018| 21:39 \nAddInProcess32.exe| 4.0.30319.36415| 42,104| 27-Jul-2018| 21:39 \nAddInUtil.exe| 4.0.30319.36415| 42,104| 27-Jul-2018| 21:39 \nAdoNetDiag.dll| 4.0.30319.36415| 170,664| 27-Jul-2018| 21:39 \nalink.dll| 12.0.52415.36415| 116,888| 27-Jul-2018| 21:39 \nalinkui.dll| 12.0.52415.36415| 35,488| 27-Jul-2018| 21:39 \nAppLaunch.exe| 4.0.30319.36415| 98,424| 27-Jul-2018| 21:39 \naspnet_compiler.exe| 4.0.30319.36415| 55,928| 27-Jul-2018| 21:39 \naspnet_counters.dll| 4.0.30319.36415| 28,352| 27-Jul-2018| 21:39 \naspnet_filter.dll| 4.0.30319.36415| 34,488| 27-Jul-2018| 21:39 \naspnet_isapi.dll| 4.0.30319.36415| 24,760| 27-Jul-2018| 21:39 \nAspnet_perf.dll| 4.0.30319.36430| 41,616| 27-Jul-2018| 21:39 \naspnet_perf.ini| | 997,498| 27-Jul-2018| 21:39 \naspnet_perf2.ini| | 995,542| 27-Jul-2018| 21:39 \naspnet_rc.dll| 4.0.30319.36415| 90,280| 27-Jul-2018| 21:39 \naspnet_regbrowsers.exe| 4.0.30319.36415| 45,176| 27-Jul-2018| 21:39 \naspnet_regiis.exe| 4.0.30319.36415| 41,080| 27-Jul-2018| 21:39 \naspnet_regsql.exe| 4.0.30319.36415| 127,608| 27-Jul-2018| 21:39 \naspnet_state.exe| 4.0.30319.36415| 45,688| 27-Jul-2018| 21:39 \naspnet_wp.exe| 4.0.30319.36430| 43,104| 27-Jul-2018| 21:39 \nAspNetMMCExt.dll| 4.0.30319.36415| 509,624| 27-Jul-2018| 21:39 \nCasPol.exe| 4.0.30319.36415| 108,152| 27-Jul-2018| 21:39 \nclr.dll| 4.0.30319.36460| 6,939,640| 27-Jul-2018| 21:43 \nCLR-ETW.man| | 303,549| 27-Jul-2018| 21:39 \nclrcompression.dll| 4.0.30319.36415| 106,688| 27-Jul-2018| 21:39 \nclretwrc.dll| 4.0.30319.36415| 228,008| 27-Jul-2018| 21:39 \nclrjit.dll| 4.0.30319.36460| 510,464| 27-Jul-2018| 21:43 \nComSvcConfig.exe| 4.0.30319.36415| 176,760| 27-Jul-2018| 21:39 \nCORPerfMonExt.dll| 4.0.30319.36415| 127,672| 27-Jul-2018| 21:39 \ncorperfmonsymbols.ini| | 1,516,922| 27-Jul-2018| 21:39 \ncsc.exe| 4.0.30319.36415| 1,853,048| 27-Jul-2018| 21:39 \ncscui.dll| 4.0.30319.36415| 203,416| 27-Jul-2018| 21:39 \nCulture.dll| 4.0.30319.36415| 54,432| 27-Jul-2018| 21:39 \nCustomMarshalers.dll| 4.0.30319.36415| 95,936| 27-Jul-2018| 21:39 \ncvtres_clr.exe| 12.0.52415.36415| 43,128| 27-Jul-2018| 21:39 \ncvtresui_clr.dll| 12.0.52415.36415| 20,144| 27-Jul-2018| 21:39 \nDataSvcUtil.exe| 4.0.30319.36415| 73,336| 27-Jul-2018| 21:39 \ndfdll.dll| 4.0.30319.36415| 141,976| 27-Jul-2018| 21:39 \ndfshim.dll.mui| 4.0.41209.0| 18,600| 27-Jul-2018| 21:39 \ndfsvc.exe| 4.0.30319.36415| 23,160| 27-Jul-2018| 21:39 \ndiasymreader.dll| 12.0.52415.36415| 859,824| 27-Jul-2018| 21:39 \ndw20.exe| 4.0.30319.36415| 45,176| 27-Jul-2018| 21:39 \nEdmGen.exe| 4.0.30319.36415| 85,624| 27-Jul-2018| 21:39 \nEventLogMessages.dll| 4.0.30319.36415| 804,552| 27-Jul-2018| 21:39 \nfiletracker.dll| 12.0.52415.36415| 226,992| 27-Jul-2018| 21:39 \nFileTrackerUI.dll| 12.0.52415.36415| 21,688| 27-Jul-2018| 21:39 \nfusion.dll| 4.0.30319.36415| 74,904| 27-Jul-2018| 21:39 \nie.browser| | 5,166| 27-Jul-2018| 21:39 \nilasm.exe| 4.0.30319.36415| 297,080| 27-Jul-2018| 21:39 \nInstallPersistSqlState.sql| | 54,647| 27-Jul-2018| 21:39 \nInstallSqlState.sql| | 54,427| 27-Jul-2018| 21:39 \nInstallSqlStateTemplate.sql| | 56,233| 27-Jul-2018| 21:39 \nInstallUtil.exe| 4.0.30319.36415| 40,568| 27-Jul-2018| 21:39 \nInstallUtilLib.dll| 4.0.30319.36415| 68,280| 27-Jul-2018| 21:39 \nISymWrapper.dll| 4.0.30319.36415| 71,856| 27-Jul-2018| 21:39 \njsc.exe| 12.0.52415.36415| 47,224| 27-Jul-2018| 21:39 \nlocale.nlp| | 419,632| 27-Jul-2018| 21:39 \nMicrosoft.Activities.Build.dll| 4.0.30319.36415| 54,160| 27-Jul-2018| 21:39 \nMicrosoft.Build.Conversion.v4.0.dll| 4.0.30319.36415| 85,248| 27-Jul-2018| 21:39 \nMicrosoft.Build.dll| 4.0.30319.36415| 1,448,128| 27-Jul-2018| 21:39 \nMicrosoft.Build.Engine.dll| 4.0.30319.36415| 668,376| 27-Jul-2018| 21:39 \nMicrosoft.Build.Framework.dll| 4.0.30319.36415| 101,608| 27-Jul-2018| 21:39 \nMicrosoft.Build.Tasks.v4.0.dll| 4.0.30319.36415| 1,191,152| 27-Jul-2018| 21:39 \nMicrosoft.Build.Utilities.v4.0.dll| 4.0.30319.36415| 273,664| 27-Jul-2018| 21:39 \nMicrosoft.Common.OverrideTasks| | 6,297| 27-Jul-2018| 21:39 \nMicrosoft.Common.targets| | 262,547| 27-Jul-2018| 21:39 \nMicrosoft.CSharp.dll| 4.0.30319.36415| 492,224| 27-Jul-2018| 21:39 \nMicrosoft.Data.Entity.Build.Tasks.dll| 4.0.30319.36415| 53,000| 27-Jul-2018| 21:39 \nMicrosoft.Data.Entity.targets| | 6,501| 27-Jul-2018| 21:43 \nMicrosoft.Internal.Tasks.Dataflow.dll| 4.0.30319.36415| 184,584| 27-Jul-2018| 21:39 \nMicrosoft.Transactions.Bridge.dll| 4.0.30319.36415| 407,824| 27-Jul-2018| 21:39 \nMicrosoft.Transactions.Bridge.Dtc.dll| 4.0.30319.36415| 131,336| 27-Jul-2018| 21:39 \nMicrosoft.VisualC.STLCLR.dll| 12.0.52415.36415| 50,920| 27-Jul-2018| 21:39 \nMicrosoft.Windows.ApplicationServer.Applications.dll.mui| 4.0.30319.36415| 99,160| 27-Jul-2018| 21:39 \nMicrosoft.Windows.ApplicationServer.Applications.dll| 4.0.30319.36415| 141,192| 27-Jul-2018| 21:39 \nMicrosoft.WinFX.targets| | 42,213| 27-Jul-2018| 21:39 \nMicrosoft.Workflow.Compiler.exe| 4.0.30319.36415| 32,888| 27-Jul-2018| 21:39 \nMicrosoft.WorkflowBuildExtensions.targets| | 7,537| 27-Jul-2018| 21:39 \nMicrosoft.Xaml.targets| | 19,848| 27-Jul-2018| 21:39 \nmicrosoft.build.commontypes.xsd| | 241,004| 27-Jul-2018| 21:39 \nMicrosoft.JScript.dll| 12.0.52415.36415| 758,984| 27-Jul-2018| 21:39 \nMicrosoft.JScript.tlb| 12.0.52415.36415| 57,856| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.Compatibility.Data.dll| 12.0.52415.36415| 108,840| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.Compatibility.dll| 12.0.52415.36415| 360,208| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.dll| 12.0.52415.36415| 651,488| 27-Jul-2018| 21:39 \nMicrosoft.VisualC.dll| 12.0.52415.36415| 30,408| 27-Jul-2018| 21:39 \nMmcAspExt.dll| 4.0.30319.36415| 107,176| 27-Jul-2018| 21:39 \nMSBuild.exe| 4.0.30319.36415| 267,896| 27-Jul-2018| 21:39 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 27-Jul-2018| 21:43 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 27-Jul-2018| 21:43 \nmscoree.tlb| 4.0.30319.36415| 30,720| 27-Jul-2018| 21:39 \nmscoreei.dll| 4.0.30319.36415| 516,264| 27-Jul-2018| 21:39 \nmscoreeis.dll| 4.0.30319.36415| 32,936| 27-Jul-2018| 21:39 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 27-Jul-2018| 21:43 \nmscorpe.dll| 4.0.30319.36415| 75,424| 27-Jul-2018| 21:39 \nmscorpehost.dll| 4.0.30319.36415| 139,952| 27-Jul-2018| 21:39 \nmscorrc.dll| 4.0.30319.36415| 395,936| 27-Jul-2018| 21:39 \nmscorsecimpl.dll| 4.0.30319.36415| 104,632| 27-Jul-2018| 21:39 \nmscorsecr.dll| 4.0.30319.36415| 38,056| 27-Jul-2018| 21:39 \nmscorsn.dll| 4.0.30319.36415| 25,760| 27-Jul-2018| 21:39 \nmscorsvc.dll| 4.0.30319.36415| 414,880| 27-Jul-2018| 21:39 \nmscorsvw.exe| 4.0.30319.36415| 103,552| 27-Jul-2018| 21:39 \nVsVersion.dll| 12.0.52415.36415| 18,088| 27-Jul-2018| 21:39 \nngen.exe| 4.0.30319.36415| 140,920| 27-Jul-2018| 21:39 \nnlssorting.dll| 4.0.30319.36415| 74,928| 27-Jul-2018| 21:39 \nnormalization.dll| 4.0.30319.36415| 31,416| 27-Jul-2018| 21:39 \nPenIMC.dll| 4.0.30319.36415| 81,560| 27-Jul-2018| 21:39 \nPerfCounter.dll| 4.0.30319.36415| 204,464| 27-Jul-2018| 21:39 \npeverify.dll| 4.0.30319.36460| 163,968| 27-Jul-2018| 21:43 \nPresentationBuildTasks.dll| 4.0.30319.36415| 604,536| 27-Jul-2018| 21:39 \nPresentationCore.dll| 4.0.30319.36415| 3,226,976| 27-Jul-2018| 21:39 \nPresentationFramework.Aero.dll| 4.0.30319.36415| 249,232| 27-Jul-2018| 21:39 \npresentationframework.aerolite.dll| 4.0.30319.36415| 177,560| 27-Jul-2018| 21:39 \nPresentationFramework.Classic.dll| 4.0.30319.36415| 181,144| 27-Jul-2018| 21:39 \nPresentationFramework.Luna.dll| 4.0.30319.36415| 484,752| 27-Jul-2018| 21:39 \nPresentationFramework.Royale.dll| 4.0.30319.36415| 208,272| 27-Jul-2018| 21:39 \nPresentationFramework.dll| 4.0.30319.36415| 6,221,688| 27-Jul-2018| 21:39 \nPresentationFramework-SystemCore.dll| 4.0.30319.36415| 25,352| 27-Jul-2018| 21:39 \nPresentationFramework-SystemData.dll| 4.0.30319.36415| 23,816| 27-Jul-2018| 21:39 \nPresentationFramework-SystemDrawing.dll| 4.0.30319.36415| 24,336| 27-Jul-2018| 21:39 \nPresentationFramework-SystemXml.dll| 4.0.30319.36415| 24,832| 27-Jul-2018| 21:39 \nPresentationFramework-SystemXmlLinq.dll| 4.0.30319.36415| 22,800| 27-Jul-2018| 21:39 \nPresentationHost_v0400.dll| 4.0.30319.36415| 186,072| 27-Jul-2018| 21:39 \nPresentationHost_v0400.dll.mui| 4.0.30319.36415| 84,720| 27-Jul-2018| 21:39 \nPresentationNative_v0400.dll| 4.0.30319.36415| 790,248| 27-Jul-2018| 21:39 \nPresentationUI.dll| 4.0.30319.36415| 847,032| 27-Jul-2018| 21:39 \nReachFramework.dll| 4.0.30319.36415| 595,288| 27-Jul-2018| 21:39 \nRegAsm.exe| 4.0.30319.36415| 64,632| 27-Jul-2018| 21:39 \nRegSvcs.exe| 4.0.30319.36415| 45,176| 27-Jul-2018| 21:39 \nregtlib.exe| 12.0.52415.36415| 84,600| 27-Jul-2018| 21:39 \nsbscmp10.dll| 4.0.41209.0| 23,720| 27-Jul-2018| 21:39 \nServiceModelEvents.dll.mui| 4.0.30319.36415| 43,744| 27-Jul-2018| 21:39 \nServiceModelEvents.dll| 4.0.30319.36415| 18,128| 27-Jul-2018| 21:39 \nServiceModelInstallRC.dll.mui| 4.0.30319.36415| 19,688| 27-Jul-2018| 21:39 \nServiceModelInstallRC.dll| 4.0.30319.36415| 18,136| 27-Jul-2018| 21:39 \nServiceModelPerformanceCounters.dll.mui| 4.0.30319.36415| 47,376| 27-Jul-2018| 21:39 \nServiceModelPerformanceCounters.dll| 4.0.30319.36415| 77,056| 27-Jul-2018| 21:39 \nServiceModelReg.exe| 4.0.30319.36415| 226,424| 27-Jul-2018| 21:39 \nServiceModelRegUI.dll.mui| 4.0.30319.36415| 37,592| 27-Jul-2018| 21:39 \nServiceModelRegUI.dll| 4.0.30319.36415| 18,120| 27-Jul-2018| 21:39 \nServiceMonikerSupport.dll| 4.0.30319.36450| 28,360| 27-Jul-2018| 21:39 \nSMDiagnostics.dll| 4.0.30319.36450| 73,328| 27-Jul-2018| 21:39 \nSMSvcHost.exe| 4.0.30319.36415| 139,896| 27-Jul-2018| 21:39 \nSOS.dll| 4.0.30319.36460| 762,472| 27-Jul-2018| 21:43 \nSystem.Speech.dll| 4.0.30319.36415| 686,424| 27-Jul-2018| 21:39 \nsysglobl.dll| 4.0.30319.36415| 133,264| 27-Jul-2018| 21:39 \nSystem.Activities.Core.Presentation.dll| 4.0.30319.36415| 718,256| 27-Jul-2018| 21:39 \nSystem.Activities.dll| 4.0.30319.36450| 1,582,704| 27-Jul-2018| 21:39 \nSystem.Activities.DurableInstancing.dll| 4.0.30319.36415| 144,176| 27-Jul-2018| 21:39 \nSystem.Activities.Presentation.dll| 4.0.30319.36415| 2,140,568| 27-Jul-2018| 21:39 \nSystem.AddIn.Contract.dll| 4.0.30319.36415| 52,440| 27-Jul-2018| 21:39 \nSystem.AddIn.dll| 4.0.30319.36415| 163,512| 27-Jul-2018| 21:39 \nSystem.Collections.Concurrent.dll| 4.0.30319.36415| 29,456| 27-Jul-2018| 21:39 \nSystem.Collections.dll| 4.0.30319.36415| 29,896| 27-Jul-2018| 21:39 \nSystem.ComponentModel.Annotations.dll| 4.0.30319.36415| 29,992| 27-Jul-2018| 21:39 \nSystem.ComponentModel.Composition.dll| 4.0.30319.36415| 312,104| 27-Jul-2018| 21:39 \nSystem.ComponentModel.Composition.Registration.dll| 4.0.30319.36415| 62,848| 27-Jul-2018| 21:39 \nSystem.ComponentModel.DataAnnotations.dll| 4.0.30319.36415| 120,640| 27-Jul-2018| 21:39 \nSystem.ComponentModel.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.ComponentModel.EventBasedAsync.dll| 4.0.30319.36415| 29,504| 27-Jul-2018| 21:39 \nSystem.Core.dll| 4.0.30319.36415| 1,271,976| 27-Jul-2018| 21:39 \nSystem.Data.DataSetExtensions.dll| 4.0.30319.36415| 72,464| 27-Jul-2018| 21:39 \nSystem.Data.Entity.Design.dll| 4.0.30319.36415| 1,087,208| 27-Jul-2018| 21:39 \nSystem.Data.Entity.dll| 4.0.30319.36415| 4,099,280| 27-Jul-2018| 21:39 \nSystem.Data.Linq.dll| 4.0.30319.36415| 698,568| 27-Jul-2018| 21:39 \nSystem.Data.Services.Client.dll| 4.0.30319.36415| 448,240| 27-Jul-2018| 21:39 \nSystem.Data.Services.Design.dll| 4.0.30319.36415| 176,368| 27-Jul-2018| 21:39 \nSystem.Data.Services.dll| 4.0.30319.36415| 684,248| 27-Jul-2018| 21:39 \nSystem.Diagnostics.Contracts.dll| 4.0.30319.36415| 29,960| 27-Jul-2018| 21:39 \nSystem.Diagnostics.Debug.dll| 4.0.30319.36415| 29,424| 27-Jul-2018| 21:39 \nSystem.Diagnostics.Tools.dll| 4.0.30319.36415| 29,424| 27-Jul-2018| 21:39 \nSystem.Diagnostics.Tracing.dll| 4.0.30319.36415| 29,440| 27-Jul-2018| 21:39 \nSystem.DirectoryServices.AccountManagement.dll| 4.0.30319.36415| 297,776| 27-Jul-2018| 21:39 \nSystem.Dynamic.dll| 4.0.30319.36415| 134,320| 27-Jul-2018| 21:39 \nSystem.Dynamic.Runtime.dll| 4.0.30319.36415| 29,928| 27-Jul-2018| 21:39 \nSystem.Globalization.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.IdentityModel.dll| 4.0.30319.36450| 1,093,784| 27-Jul-2018| 21:39 \nSystem.IdentityModel.Selectors.dll| 4.0.30319.36415| 145,680| 27-Jul-2018| 21:39 \nSystem.IdentityModel.Services.dll| 4.0.30319.36450| 199,912| 27-Jul-2018| 21:39 \nSystem.IO.dll| 4.0.30319.36415| 29,336| 27-Jul-2018| 21:39 \nSystem.IO.Log.dll| 4.0.30319.36415| 134,992| 27-Jul-2018| 21:39 \nSystem.Linq.dll| 4.0.30319.36415| 29,344| 27-Jul-2018| 21:39 \nSystem.Linq.Expressions.dll| 4.0.30319.36415| 31,472| 27-Jul-2018| 21:39 \nSystem.Linq.Parallel.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.Linq.Queryable.dll| 4.0.30319.36415| 29,408| 27-Jul-2018| 21:39 \nSystem.Management.Instrumentation.dll| 4.0.30319.36415| 146,696| 27-Jul-2018| 21:39 \nSystem.Net.dll| 4.0.30319.36415| 259,744| 27-Jul-2018| 21:39 \nSystem.Net.Http.Rtc.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.Net.NetworkInformation.dll| 4.0.30319.36415| 29,456| 27-Jul-2018| 21:39 \nSystem.Net.Primitives.dll| 4.0.30319.36415| 29,408| 27-Jul-2018| 21:39 \nSystem.Net.Requests.dll| 4.0.30319.36415| 29,392| 27-Jul-2018| 21:39 \nSystem.ObjectModel.dll| 4.0.30319.36415| 29,904| 27-Jul-2018| 21:39 \nSystem.Printing.dll| 4.0.30319.36415| 343,384| 27-Jul-2018| 21:39 \nSystem.Reflection.dll| 4.0.30319.36415| 29,896| 27-Jul-2018| 21:39 \nSystem.Reflection.Emit.dll| 4.0.30319.36415| 29,416| 27-Jul-2018| 21:39 \nSystem.Reflection.Emit.ILGeneration.dll| 4.0.30319.36415| 29,488| 27-Jul-2018| 21:39 \nSystem.Reflection.Emit.Lightweight.dll| 4.0.30319.36415| 29,488| 27-Jul-2018| 21:39 \nSystem.Reflection.Extensions.dll| 4.0.30319.36415| 29,448| 27-Jul-2018| 21:39 \nSystem.Reflection.Primitives.dll| 4.0.30319.36415| 29,448| 27-Jul-2018| 21:39 \nSystem.Resources.ResourceManager.dll| 4.0.30319.36415| 29,472| 27-Jul-2018| 21:39 \nSystem.Runtime.dll| 4.0.30319.36415| 36,528| 27-Jul-2018| 21:39 \nSystem.Runtime.DurableInstancing.dll| 4.0.30319.36415| 173,344| 27-Jul-2018| 21:39 \nSystem.Runtime.Extensions.dll| 4.0.30319.36415| 29,432| 27-Jul-2018| 21:39 \nSystem.Runtime.InteropServices.dll| 4.0.30319.36415| 32,536| 27-Jul-2018| 21:39 \nSystem.Runtime.InteropServices.WindowsRuntime.dll| 4.0.30319.36415| 29,560| 27-Jul-2018| 21:39 \nSystem.Runtime.Numerics.dll| 4.0.30319.36415| 29,424| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.dll| 4.0.30319.36450| 1,060,008| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.Json.dll| 4.0.30319.36415| 29,480| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.Primitives.dll| 4.0.30319.36415| 29,520| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.Xml.dll| 4.0.30319.36415| 29,984| 27-Jul-2018| 21:39 \nSystem.Security.Principal.dll| 4.0.30319.36415| 29,432| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Activation.dll| 4.0.30319.36415| 204,184| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Activities.dll| 4.0.30319.36415| 570,264| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Channels.dll| 4.0.30319.36450| 159,624| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Discovery.dll| 4.0.30319.36450| 312,712| 27-Jul-2018| 21:39 \nSystem.ServiceModel.dll| 4.0.30319.36450| 6,386,832| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Duplex.dll| 4.0.30319.36415| 29,440| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Http.dll| 4.0.30319.36415| 29,936| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Internals.dll| 4.0.30319.36450| 254,648| 27-Jul-2018| 21:39 \nSystem.ServiceModel.NetTcp.dll| 4.0.30319.36415| 29,432| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Primitives.dll| 4.0.30319.36415| 34,072| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Routing.dll| 4.0.30319.36415| 132,496| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Security.dll| 4.0.30319.36415| 29,960| 27-Jul-2018| 21:39 \nSystem.ServiceModel.ServiceMoniker40.dll| 4.0.30319.36415| 23,312| 27-Jul-2018| 21:39 \nSystem.ServiceModel.WasHosting.dll| 4.0.30319.36450| 39,664| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Web.dll| 4.0.30319.36415| 332,520| 27-Jul-2018| 21:39 \nSystem.Text.Encoding.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.Text.Encoding.Extensions.dll| 4.0.30319.36415| 29,464| 27-Jul-2018| 21:39 \nSystem.Text.RegularExpressions.dll| 4.0.30319.36415| 29,456| 27-Jul-2018| 21:39 \nSystem.Threading.dll| 4.0.30319.36415| 29,888| 27-Jul-2018| 21:39 \nSystem.Threading.Tasks.dll| 4.0.30319.36415| 30,432| 27-Jul-2018| 21:39 \nSystem.Threading.Tasks.Parallel.dll| 4.0.30319.36415| 29,472| 27-Jul-2018| 21:39 \nSystem.Web.Abstractions.dll| 4.0.30319.36415| 22,912| 27-Jul-2018| 21:39 \nSystem.Web.ApplicationServices.dll| 4.0.30319.36430| 71,424| 27-Jul-2018| 21:39 \nSystem.Web.DataVisualization.Design.dll| 4.0.30319.36415| 106,928| 27-Jul-2018| 21:39 \nSystem.Web.DynamicData.Design.dll| 4.0.30319.36415| 44,952| 27-Jul-2018| 21:39 \nSystem.Web.DynamicData.dll| 4.0.30319.36415| 248,696| 27-Jul-2018| 21:39 \nSystem.Web.Entity.Design.dll| 4.0.30319.36415| 172,264| 27-Jul-2018| 21:39 \nSystem.Web.Entity.dll| 4.0.30319.36415| 166,088| 27-Jul-2018| 21:39 \nSystem.Web.Extensions.Design.dll| 4.0.30319.36415| 354,704| 27-Jul-2018| 21:39 \nSystem.Web.Extensions.dll| 4.0.30319.36430| 1,859,280| 27-Jul-2018| 21:39 \nSystem.Web.Routing.dll| 4.0.30319.36415| 22,376| 27-Jul-2018| 21:39 \nSystem.Windows.dll| 4.0.30319.36415| 31,416| 27-Jul-2018| 21:39 \nSystem.Windows.Forms.DataVisualization.Design.dll| 4.0.30319.36415| 82,904| 27-Jul-2018| 21:39 \nSystem.Windows.Forms.DataVisualization.dll| 4.0.30319.36415| 1,726,392| 27-Jul-2018| 21:39 \nSystem.Workflow.Activities.dll| 4.0.30319.36450| 1,068,416| 27-Jul-2018| 21:39 \nSystem.Workflow.ComponentModel.dll| 4.0.30319.36450| 1,560,464| 27-Jul-2018| 21:39 \nSystem.Workflow.Runtime.dll| 4.0.30319.36450| 503,664| 27-Jul-2018| 21:39 \nSystem.WorkflowServices.dll| 4.0.30319.36415| 455,040| 27-Jul-2018| 21:39 \nSystem.Xaml.Hosting.dll| 4.0.30319.36415| 42,704| 27-Jul-2018| 21:39 \nSystem.Xml.Linq.dll| 4.0.30319.36415| 163,512| 27-Jul-2018| 21:39 \nSystem.Xml.ReaderWriter.dll| 4.0.30319.36415| 29,928| 27-Jul-2018| 21:39 \nSystem.Xml.Serialization.dll| 4.0.30319.36415| 45,808| 27-Jul-2018| 21:39 \nSystem.Xml.XDocument.dll| 4.0.30319.36415| 29,912| 27-Jul-2018| 21:39 \nSystem.Xml.XmlSerializer.dll| 4.0.30319.36415| 29,936| 27-Jul-2018| 21:39 \nSystem.Runtime.Caching.dll| 4.0.30319.36415| 109,272| 27-Jul-2018| 21:39 \nSystem.Configuration.dll| 4.0.30319.36415| 402,648| 27-Jul-2018| 21:39 \nSystem.Configuration.Install.dll| 4.0.30319.36415| 103,176| 27-Jul-2018| 21:39 \nSystem.Data.dll| 4.0.30319.36415| 3,209,392| 27-Jul-2018| 21:39 \nSystem.Data.OracleClient.dll| 4.0.30319.36415| 509,672| 27-Jul-2018| 21:39 \nSystem.Data.SqlXml.dll| 4.0.30319.36430| 752,312| 27-Jul-2018| 21:39 \nSystem.Deployment.dll| 4.0.30319.36415| 853,704| 27-Jul-2018| 21:39 \nSystem.Design.dll| 4.0.30319.36415| 5,056,176| 27-Jul-2018| 21:39 \nSystem.Device.dll| 4.0.30319.36415| 64,184| 27-Jul-2018| 21:39 \nSystem.DirectoryServices.dll| 4.0.30319.36415| 425,712| 27-Jul-2018| 21:39 \nSystem.DirectoryServices.Protocols.dll| 4.0.30319.36415| 203,056| 27-Jul-2018| 21:39 \nSystem.dll| 4.0.30319.36460| 3,490,240| 27-Jul-2018| 21:43 \nSystem.Drawing.Design.dll| 4.0.30319.36415| 113,888| 27-Jul-2018| 21:39 \nSystem.Drawing.dll| 4.0.30319.36415| 598,712| 27-Jul-2018| 21:39 \nSystem.Drawing.tlb| 4.0.30319.36415| 7,680| 27-Jul-2018| 21:39 \nSystem.EnterpriseServices.dll| 4.0.30319.36415| 248,552| 27-Jul-2018| 21:39 \nSystem.EnterpriseServices.Thunk.dll| 4.0.30319.36415| 86,784| 27-Jul-2018| 21:39 \nSystem.EnterpriseServices.tlb| 4.0.30319.36415| 33,280| 27-Jul-2018| 21:39 \nSystem.EnterpriseServices.Wrapper.dll| 4.0.30319.36415| 111,104| 27-Jul-2018| 21:39 \nSystem.IO.Compression.dll| 4.0.30319.36415| 71,896| 27-Jul-2018| 21:39 \nSystem.IO.Compression.FileSystem.dll| 4.0.30319.36415| 28,936| 27-Jul-2018| 21:39 \nSystem.Management.dll| 4.0.30319.36415| 417,480| 27-Jul-2018| 21:39 \nSystem.Messaging.dll| 4.0.30319.36415| 274,112| 27-Jul-2018| 21:39 \nSystem.Net.Http.dll| 4.0.30319.36415| 202,432| 27-Jul-2018| 21:39 \nSystem.Net.Http.WebRequest.dll| 4.0.30319.36415| 50,944| 27-Jul-2018| 21:39 \nSystem.Numerics.dll| 4.0.30319.36415| 86,208| 27-Jul-2018| 21:39 \nSystem.Reflection.context.dll| 4.0.30319.36415| 108,272| 27-Jul-2018| 21:39 \nSystem.Runtime.Remoting.dll| 4.0.30319.36415| 348,904| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.Formatters.Soap.dll| 4.0.30319.36415| 142,192| 27-Jul-2018| 21:39 \nSystem.Security.dll| 4.0.30319.36440| 301,648| 27-Jul-2018| 21:39 \nSystem.ServiceProcess.dll| 4.0.30319.36415| 134,872| 27-Jul-2018| 21:39 \nSystem.tlb| 12.0.52415.36415| 71,168| 27-Jul-2018| 21:39 \nSystem.Transactions.dll| 4.0.30319.36415| 289,488| 27-Jul-2018| 21:39 \nSystem.Web.dll| 4.0.30319.36430| 5,464,208| 27-Jul-2018| 21:39 \nSystem.Web.Mobile.dll| 4.0.30319.36415| 839,880| 27-Jul-2018| 21:39 \nSystem.Web.RegularExpressions.dll| 4.0.30319.36415| 107,768| 27-Jul-2018| 21:39 \nSystem.Web.Services.dll| 4.0.30319.36415| 858,320| 27-Jul-2018| 21:39 \nSystem.Web.tlb| 4.0.30319.36415| 6,144| 27-Jul-2018| 21:39 \nSystem.Windows.Controls.Ribbon.dll| 4.0.30319.36415| 751,512| 27-Jul-2018| 21:39 \nSystem.Windows.Forms.dll| 4.0.30319.36415| 4,859,608| 27-Jul-2018| 21:39 \nSystem.Windows.Forms.tlb| 4.0.30319.36415| 85,504| 27-Jul-2018| 21:39 \nSystem.Windows.Input.Manipulations.dll| 4.0.30319.36415| 68,520| 27-Jul-2018| 21:39 \nSystem.Windows.Presentation.dll| 4.0.30319.36415| 29,072| 27-Jul-2018| 21:39 \nSystem.Xaml.dll| 4.0.30319.36415| 640,672| 27-Jul-2018| 21:39 \nSystem.Xml.dll| 4.0.30319.36430| 2,705,032| 27-Jul-2018| 21:39 \nTLBREF.DLL| 4.0.30319.36415| 101,024| 27-Jul-2018| 21:39 \nUIAutomationClient.dll| 4.0.30319.36415| 178,536| 27-Jul-2018| 21:39 \nUIAutomationClientsideProviders.dll| 4.0.30319.36415| 365,984| 27-Jul-2018| 21:39 \nUIAutomationProvider.dll| 4.0.30319.36415| 48,496| 27-Jul-2018| 21:39 \nUIAutomationTypes.dll| 4.0.30319.36415| 105,832| 27-Jul-2018| 21:39 \nwebengine.dll| 4.0.30319.36430| 24,720| 27-Jul-2018| 21:39 \nwebengine4.dll| 4.0.30319.36430| 509,584| 27-Jul-2018| 21:39 \nWindowsBase.dll| 4.0.30319.36415| 1,241,936| 27-Jul-2018| 21:39 \nWindowsFormsIntegration.dll| 4.0.30319.36415| 102,784| 27-Jul-2018| 21:39 \nWMINet_Utils.dll| 4.0.30319.36415| 126,136| 27-Jul-2018| 21:39 \nWorkflowServiceHostPerformanceCounters.dll.mui| 4.0.30319.36415| 24,368| 27-Jul-2018| 21:39 \nWorkflowServiceHostPerformanceCounters.dll| 4.0.30319.36450| 75,536| 27-Jul-2018| 21:39 \nwpf-etw.man| | 151,330| 27-Jul-2018| 21:39 \nWPFFontCache_v0400.exe.mui| 4.0.30319.36415| 19,168| 27-Jul-2018| 21:39 \nWPFFontCache_v0400.exe| 4.0.30319.36415| 24,696| 27-Jul-2018| 21:39 \nwpfgfx_v0400.dll| 4.0.30319.36415| 1,648,304| 27-Jul-2018| 21:39 \nWsatConfig.exe| 4.0.30319.36415| 155,256| 27-Jul-2018| 21:39 \nXamlBuildTask.dll| 4.0.30319.36415| 133,976| 27-Jul-2018| 21:39 \nXsdBuildTask.dll| 4.0.30319.36415| 68,280| 27-Jul-2018| 21:39 \nThirdPartyNotices.txt| | 20,126| 27-Jul-2018| 21:43 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 27-Jul-2018| 21:43 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 27-Jul-2018| 21:43 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nSystem.Linq.Parallel.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.Linq.Queryable.dll| 4.0.30319.36415| 29,408| 27-Jul-2018| 21:39 \nSystem.Management.Instrumentation.dll| 4.0.30319.36415| 146,696| 27-Jul-2018| 21:39 \nSystem.Net.dll| 4.0.30319.36415| 259,744| 27-Jul-2018| 21:39 \nSystem.Net.Http.Rtc.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.Net.NetworkInformation.dll| 4.0.30319.36415| 29,456| 27-Jul-2018| 21:39 \nSystem.Net.Primitives.dll| 4.0.30319.36415| 29,408| 27-Jul-2018| 21:39 \nSystem.Net.Requests.dll| 4.0.30319.36415| 29,392| 27-Jul-2018| 21:39 \nSystem.ObjectModel.dll| 4.0.30319.36415| 29,904| 27-Jul-2018| 21:39 \nSystem.Printing.dll| 4.0.30319.36415| 342,720| 27-Jul-2018| 21:41 \nSystem.Printing.dll| 4.0.30319.36415| 343,384| 27-Jul-2018| 21:39 \nSystem.Reflection.dll| 4.0.30319.36415| 29,896| 27-Jul-2018| 21:39 \nSystem.Reflection.Emit.dll| 4.0.30319.36415| 29,416| 27-Jul-2018| 21:39 \nSystem.Reflection.Emit.ILGeneration.dll| 4.0.30319.36415| 29,488| 27-Jul-2018| 21:39 \nSystem.Reflection.Emit.Lightweight.dll| 4.0.30319.36415| 29,488| 27-Jul-2018| 21:39 \nSystem.Reflection.Extensions.dll| 4.0.30319.36415| 29,448| 27-Jul-2018| 21:39 \nSystem.Reflection.Primitives.dll| 4.0.30319.36415| 29,448| 27-Jul-2018| 21:39 \nSystem.Resources.ResourceManager.dll| 4.0.30319.36415| 29,472| 27-Jul-2018| 21:39 \nSystem.Runtime.dll| 4.0.30319.36415| 36,528| 27-Jul-2018| 21:39 \nSystem.Runtime.DurableInstancing.dll| 4.0.30319.36415| 173,344| 27-Jul-2018| 21:39 \nSystem.Runtime.Extensions.dll| 4.0.30319.36415| 29,432| 27-Jul-2018| 21:39 \nSystem.Runtime.InteropServices.dll| 4.0.30319.36415| 32,536| 27-Jul-2018| 21:39 \nSystem.Runtime.InteropServices.WindowsRuntime.dll| 4.0.30319.36415| 29,560| 27-Jul-2018| 21:39 \nSystem.Runtime.Numerics.dll| 4.0.30319.36415| 29,424| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.dll| 4.0.30319.36450| 1,060,008| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.Json.dll| 4.0.30319.36415| 29,480| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.Primitives.dll| 4.0.30319.36415| 29,520| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.Xml.dll| 4.0.30319.36415| 29,984| 27-Jul-2018| 21:39 \nSystem.Security.Principal.dll| 4.0.30319.36415| 29,432| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Activation.dll| 4.0.30319.36415| 204,184| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Activities.dll| 4.0.30319.36415| 570,264| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Channels.dll| 4.0.30319.36450| 159,624| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Discovery.dll| 4.0.30319.36450| 312,712| 27-Jul-2018| 21:39 \nSystem.ServiceModel.dll| 4.0.30319.36450| 6,386,832| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Duplex.dll| 4.0.30319.36415| 29,440| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Http.dll| 4.0.30319.36415| 29,936| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Internals.dll| 4.0.30319.36450| 254,648| 27-Jul-2018| 21:39 \nSystem.ServiceModel.NetTcp.dll| 4.0.30319.36415| 29,432| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Primitives.dll| 4.0.30319.36415| 34,072| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Routing.dll| 4.0.30319.36415| 132,496| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Security.dll| 4.0.30319.36415| 29,960| 27-Jul-2018| 21:39 \nSystem.ServiceModel.ServiceMoniker40.dll| 4.0.30319.36415| 23,312| 27-Jul-2018| 21:39 \nSystem.ServiceModel.WasHosting.dll| 4.0.30319.36450| 39,664| 27-Jul-2018| 21:39 \nSystem.ServiceModel.Web.dll| 4.0.30319.36415| 332,520| 27-Jul-2018| 21:39 \nSystem.Text.Encoding.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.Text.Encoding.Extensions.dll| 4.0.30319.36415| 29,464| 27-Jul-2018| 21:39 \nSystem.Text.RegularExpressions.dll| 4.0.30319.36415| 29,456| 27-Jul-2018| 21:39 \nSystem.Threading.dll| 4.0.30319.36415| 29,888| 27-Jul-2018| 21:39 \nSystem.Threading.Tasks.dll| 4.0.30319.36415| 30,432| 27-Jul-2018| 21:39 \nSystem.Threading.Tasks.Parallel.dll| 4.0.30319.36415| 29,472| 27-Jul-2018| 21:39 \nSystem.Web.Abstractions.dll| 4.0.30319.36415| 22,912| 27-Jul-2018| 21:39 \nSystem.Web.ApplicationServices.dll| 4.0.30319.36430| 71,424| 27-Jul-2018| 21:39 \nSystem.Web.DataVisualization.Design.dll| 4.0.30319.36415| 106,928| 27-Jul-2018| 21:39 \nSystem.Web.DynamicData.Design.dll| 4.0.30319.36415| 44,952| 27-Jul-2018| 21:39 \nSystem.Web.DynamicData.dll| 4.0.30319.36415| 248,696| 27-Jul-2018| 21:39 \nSystem.Web.Entity.Design.dll| 4.0.30319.36415| 172,264| 27-Jul-2018| 21:39 \nSystem.Web.Entity.dll| 4.0.30319.36415| 166,088| 27-Jul-2018| 21:39 \nSystem.Web.Extensions.Design.dll| 4.0.30319.36415| 354,704| 27-Jul-2018| 21:39 \nSystem.Web.Extensions.dll| 4.0.30319.36430| 1,859,280| 27-Jul-2018| 21:39 \nSystem.Web.Routing.dll| 4.0.30319.36415| 22,376| 27-Jul-2018| 21:39 \nSystem.Windows.dll| 4.0.30319.36415| 31,416| 27-Jul-2018| 21:39 \nSystem.Windows.Forms.DataVisualization.Design.dll| 4.0.30319.36415| 82,904| 27-Jul-2018| 21:39 \nSystem.Windows.Forms.DataVisualization.dll| 4.0.30319.36415| 1,726,392| 27-Jul-2018| 21:39 \nSystem.Workflow.Activities.dll| 4.0.30319.36450| 1,068,416| 27-Jul-2018| 21:39 \nSystem.Workflow.ComponentModel.dll| 4.0.30319.36450| 1,560,464| 27-Jul-2018| 21:39 \nSystem.Workflow.Runtime.dll| 4.0.30319.36450| 503,664| 27-Jul-2018| 21:39 \nSystem.WorkflowServices.dll| 4.0.30319.36415| 455,040| 27-Jul-2018| 21:39 \nSystem.Xaml.Hosting.dll| 4.0.30319.36415| 42,704| 27-Jul-2018| 21:39 \nSystem.Xml.Linq.dll| 4.0.30319.36415| 163,512| 27-Jul-2018| 21:39 \nSystem.Xml.ReaderWriter.dll| 4.0.30319.36415| 29,928| 27-Jul-2018| 21:39 \nSystem.Xml.Serialization.dll| 4.0.30319.36415| 45,808| 27-Jul-2018| 21:39 \nSystem.Xml.XDocument.dll| 4.0.30319.36415| 29,912| 27-Jul-2018| 21:39 \nSystem.Xml.XmlSerializer.dll| 4.0.30319.36415| 29,936| 27-Jul-2018| 21:39 \nSystem.Runtime.Caching.dll| 4.0.30319.36415| 109,272| 27-Jul-2018| 21:39 \nSystem.configuration.dll| 4.0.30319.36415| 402,648| 27-Jul-2018| 21:39 \nSystem.Configuration.Install.dll| 4.0.30319.36415| 103,176| 27-Jul-2018| 21:39 \nSystem.Data.dll| 4.0.30319.36415| 3,238,064| 27-Jul-2018| 21:41 \nSystem.Data.dll| 4.0.30319.36415| 3,209,392| 27-Jul-2018| 21:39 \nSystem.Data.OracleClient.dll| 4.0.30319.36415| 510,176| 27-Jul-2018| 21:41 \nSystem.Data.OracleClient.dll| 4.0.30319.36415| 509,672| 27-Jul-2018| 21:39 \nSystem.Data.SqlXml.dll| 4.0.30319.36430| 752,312| 27-Jul-2018| 21:39 \nSystem.Deployment.dll| 4.0.30319.36415| 853,704| 27-Jul-2018| 21:39 \nSystem.Design.dll| 4.0.30319.36415| 5,056,176| 27-Jul-2018| 21:39 \nSystem.Device.dll| 4.0.30319.36415| 64,184| 27-Jul-2018| 21:39 \nSystem.DirectoryServices.dll| 4.0.30319.36415| 425,712| 27-Jul-2018| 21:39 \nSystem.DirectoryServices.Protocols.dll| 4.0.30319.36415| 203,056| 27-Jul-2018| 21:39 \nSystem.dll| 4.0.30319.36460| 3,490,240| 27-Jul-2018| 21:43 \nSystem.Drawing.Design.dll| 4.0.30319.36415| 113,888| 27-Jul-2018| 21:39 \nSystem.Drawing.dll| 4.0.30319.36415| 598,712| 27-Jul-2018| 21:39 \nSystem.Drawing.tlb| 4.0.30319.36415| 7,680| 27-Jul-2018| 21:41 \nSystem.Drawing.tlb| 4.0.30319.36415| 7,680| 27-Jul-2018| 21:39 \nSystem.EnterpriseServices.dll| 4.0.30319.36415| 248,040| 27-Jul-2018| 21:41 \nSystem.EnterpriseServices.dll| 4.0.30319.36415| 248,552| 27-Jul-2018| 21:39 \nSystem.EnterpriseServices.Thunk.dll| 4.0.30319.36415| 91,392| 27-Jul-2018| 21:41 \nSystem.EnterpriseServices.Thunk.dll| 4.0.30319.36415| 86,784| 27-Jul-2018| 21:39 \nSystem.EnterpriseServices.tlb| 4.0.30319.36415| 33,280| 27-Jul-2018| 21:41 \nSystem.EnterpriseServices.tlb| 4.0.30319.36415| 33,280| 27-Jul-2018| 21:39 \nSystem.EnterpriseServices.Wrapper.dll| 4.0.30319.36415| 125,440| 27-Jul-2018| 21:41 \nSystem.EnterpriseServices.Wrapper.dll| 4.0.30319.36415| 111,104| 27-Jul-2018| 21:39 \nSystem.IO.Compression.dll| 4.0.30319.36415| 71,896| 27-Jul-2018| 21:39 \nSystem.IO.Compression.FileSystem.dll| 4.0.30319.36415| 28,936| 27-Jul-2018| 21:39 \nSystem.Management.dll| 4.0.30319.36415| 417,480| 27-Jul-2018| 21:39 \nSystem.Messaging.dll| 4.0.30319.36415| 274,112| 27-Jul-2018| 21:39 \nSystem.Net.Http.dll| 4.0.30319.36415| 202,432| 27-Jul-2018| 21:39 \nSystem.Net.Http.WebRequest.dll| 4.0.30319.36415| 50,944| 27-Jul-2018| 21:39 \nSystem.Numerics.dll| 4.0.30319.36415| 86,208| 27-Jul-2018| 21:39 \nSystem.Reflection.context.dll| 4.0.30319.36415| 108,272| 27-Jul-2018| 21:39 \nSystem.Runtime.Remoting.dll| 4.0.30319.36415| 348,904| 27-Jul-2018| 21:39 \nSystem.Runtime.Serialization.Formatters.Soap.dll| 4.0.30319.36415| 142,192| 27-Jul-2018| 21:39 \nSystem.Security.dll| 4.0.30319.36440| 301,648| 27-Jul-2018| 21:39 \nSystem.ServiceProcess.dll| 4.0.30319.36415| 134,872| 27-Jul-2018| 21:39 \nSystem.tlb| 12.0.52415.36415| 71,168| 27-Jul-2018| 21:41 \nSystem.tlb| 12.0.52415.36415| 71,168| 27-Jul-2018| 21:39 \nSystem.Transactions.dll| 4.0.30319.36415| 292,560| 27-Jul-2018| 21:41 \nSystem.Transactions.dll| 4.0.30319.36415| 289,488| 27-Jul-2018| 21:39 \nSystem.Web.dll| 4.0.30319.36430| 5,458,064| 27-Jul-2018| 21:41 \nSystem.Web.dll| 4.0.30319.36430| 5,464,208| 27-Jul-2018| 21:39 \nSystem.Web.Mobile.dll| 4.0.30319.36415| 839,880| 27-Jul-2018| 21:39 \nSystem.Web.RegularExpressions.dll| 4.0.30319.36415| 107,768| 27-Jul-2018| 21:39 \nSystem.Web.Services.dll| 4.0.30319.36415| 858,320| 27-Jul-2018| 21:39 \nSystem.Web.tlb| 4.0.30319.36415| 6,144| 27-Jul-2018| 21:41 \nSystem.Web.tlb| 4.0.30319.36415| 6,144| 27-Jul-2018| 21:39 \nSystem.Windows.Controls.Ribbon.dll| 4.0.30319.36415| 751,512| 27-Jul-2018| 21:39 \nSystem.Windows.Forms.dll| 4.0.30319.36415| 4,859,608| 27-Jul-2018| 21:39 \nSystem.Windows.Forms.tlb| 4.0.30319.36415| 85,504| 27-Jul-2018| 21:41 \nSystem.Windows.Forms.tlb| 4.0.30319.36415| 85,504| 27-Jul-2018| 21:39 \nSystem.Windows.Input.Manipulations.dll| 4.0.30319.36415| 68,520| 27-Jul-2018| 21:39 \nSystem.Windows.Presentation.dll| 4.0.30319.36415| 29,072| 27-Jul-2018| 21:39 \nSystem.Xaml.dll| 4.0.30319.36415| 640,672| 27-Jul-2018| 21:39 \nSystem.XML.dll| 4.0.30319.36430| 2,705,032| 27-Jul-2018| 21:39 \nTLBREF.DLL| 4.0.30319.36415| 115,352| 27-Jul-2018| 21:41 \nTLBREF.DLL| 4.0.30319.36415| 101,024| 27-Jul-2018| 21:39 \nSystem.Web.DataVisualization.dll| 4.0.30319.36415| 1,713,560| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.Activities.Compiler.dll| 12.0.52415.36415| 4,008,232| 27-Jul-2018| 21:41 \nMicrosoft.VisualBasic.Activities.Compiler.dll| 12.0.52415.36415| 3,194,664| 27-Jul-2018| 21:39 \nvbc.exe| 12.0.52415.36415| 3,546,232| 27-Jul-2018| 21:41 \nvbc.exe| 12.0.52415.36415| 2,459,256| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.Activities.CompilerUI.dll| 12.0.52415.36415| 272,184| 27-Jul-2018| 21:41 \nMicrosoft.VisualBasic.Activities.CompilerUI.dll| 12.0.52415.36415| 272,184| 27-Jul-2018| 21:39 \nvbc7ui.dll| 12.0.52415.36415| 271,512| 27-Jul-2018| 21:41 \nvbc7ui.dll| 12.0.52415.36415| 271,512| 27-Jul-2018| 21:39 \nAccessibility.dll| 4.0.30319.36415| 36,008| 27-Jul-2018| 21:39 \nAddInProcess.exe| 4.0.30319.36415| 42,104| 27-Jul-2018| 21:39 \nAddInProcess32.exe| 4.0.30319.36415| 42,104| 27-Jul-2018| 21:39 \nAddInUtil.exe| 4.0.30319.36415| 42,104| 27-Jul-2018| 21:39 \nAdoNetDiag.dll| 4.0.30319.36415| 188,072| 27-Jul-2018| 21:41 \nAdoNetDiag.dll| 4.0.30319.36415| 170,664| 27-Jul-2018| 21:39 \nalink.dll| 12.0.52415.36415| 145,048| 27-Jul-2018| 21:41 \nalink.dll| 12.0.52415.36415| 116,888| 27-Jul-2018| 21:39 \nalinkui.dll| 12.0.52415.36415| 35,488| 27-Jul-2018| 21:41 \nalinkui.dll| 12.0.52415.36415| 35,488| 27-Jul-2018| 21:39 \nAppLaunch.exe| 4.0.30319.36415| 115,832| 27-Jul-2018| 21:41 \nAppLaunch.exe| 4.0.30319.36415| 98,424| 27-Jul-2018| 21:39 \naspnet_compiler.exe| 4.0.30319.36415| 54,904| 27-Jul-2018| 21:41 \naspnet_compiler.exe| 4.0.30319.36415| 55,928| 27-Jul-2018| 21:39 \naspnet_counters.dll| 4.0.30319.36415| 29,888| 27-Jul-2018| 21:41 \naspnet_counters.dll| 4.0.30319.36415| 28,352| 27-Jul-2018| 21:39 \naspnet_filter.dll| 4.0.30319.36415| 37,560| 27-Jul-2018| 21:41 \naspnet_filter.dll| 4.0.30319.36415| 34,488| 27-Jul-2018| 21:39 \naspnet_isapi.dll| 4.0.30319.36415| 25,776| 27-Jul-2018| 21:41 \naspnet_isapi.dll| 4.0.30319.36415| 24,760| 27-Jul-2018| 21:39 \nAspnet_perf.dll| 4.0.30319.36430| 45,208| 27-Jul-2018| 21:41 \nAspnet_perf.dll| 4.0.30319.36430| 41,616| 27-Jul-2018| 21:39 \naspnet_perf.ini| | 997,498| 27-Jul-2018| 21:39 \naspnet_perf2.ini| | 995,542| 27-Jul-2018| 21:39 \naspnet_rc.dll| 4.0.30319.36415| 90,280| 27-Jul-2018| 21:41 \naspnet_rc.dll| 4.0.30319.36415| 90,280| 27-Jul-2018| 21:39 \naspnet_regbrowsers.exe| 4.0.30319.36415| 44,664| 27-Jul-2018| 21:41 \naspnet_regbrowsers.exe| 4.0.30319.36415| 45,176| 27-Jul-2018| 21:39 \naspnet_regiis.exe| 4.0.30319.36415| 43,640| 27-Jul-2018| 21:41 \naspnet_regiis.exe| 4.0.30319.36415| 41,080| 27-Jul-2018| 21:39 \naspnet_regsql.exe| 4.0.30319.36415| 127,096| 27-Jul-2018| 21:41 \naspnet_regsql.exe| 4.0.30319.36415| 127,608| 27-Jul-2018| 21:39 \naspnet_state.exe| 4.0.30319.36415| 50,808| 27-Jul-2018| 21:41 \naspnet_state.exe| 4.0.30319.36415| 45,688| 27-Jul-2018| 21:39 \naspnet_wp.exe| 4.0.30319.36430| 47,712| 27-Jul-2018| 21:41 \naspnet_wp.exe| 4.0.30319.36430| 43,104| 27-Jul-2018| 21:39 \nAspNetMMCExt.dll| 4.0.30319.36415| 509,624| 27-Jul-2018| 21:39 \nCasPol.exe| 4.0.30319.36415| 107,640| 27-Jul-2018| 21:41 \nCasPol.exe| 4.0.30319.36415| 108,152| 27-Jul-2018| 21:39 \nclr.dll| 4.0.30319.36460| 10,070,120| 27-Jul-2018| 22:28 \nclr.dll| 4.0.30319.36460| 6,939,640| 27-Jul-2018| 21:43 \nCLR-ETW.man| | 303,557| 27-Jul-2018| 21:41 \nCLR-ETW.man| | 303,549| 27-Jul-2018| 21:39 \nclrcompression.dll| 4.0.30319.36415| 122,048| 27-Jul-2018| 21:41 \nclrcompression.dll| 4.0.30319.36415| 106,688| 27-Jul-2018| 21:39 \nclretwrc.dll| 4.0.30319.36415| 228,008| 27-Jul-2018| 21:41 \nclretwrc.dll| 4.0.30319.36415| 228,008| 27-Jul-2018| 21:39 \nclrjit.dll| 4.0.30319.36460| 1,234,552| 27-Jul-2018| 22:28 \nclrjit.dll| 4.0.30319.36460| 510,464| 27-Jul-2018| 21:43 \nComSvcConfig.exe| 4.0.30319.36415| 176,760| 27-Jul-2018| 21:39 \nCORPerfMonExt.dll| 4.0.30319.36415| 153,784| 27-Jul-2018| 21:41 \nCORPerfMonExt.dll| 4.0.30319.36415| 127,672| 27-Jul-2018| 21:39 \ncorperfmonsymbols.ini| | 1,516,922| 27-Jul-2018| 21:39 \ncsc.exe| 4.0.30319.36415| 2,637,432| 27-Jul-2018| 21:41 \ncsc.exe| 4.0.30319.36415| 1,853,048| 27-Jul-2018| 21:39 \ncscui.dll| 4.0.30319.36415| 203,416| 27-Jul-2018| 21:41 \ncscui.dll| 4.0.30319.36415| 203,416| 27-Jul-2018| 21:39 \nCulture.dll| 4.0.30319.36415| 63,648| 27-Jul-2018| 21:41 \nCulture.dll| 4.0.30319.36415| 54,432| 27-Jul-2018| 21:39 \nCustomMarshalers.dll| 4.0.30319.36415| 104,648| 27-Jul-2018| 21:41 \nCustomMarshalers.dll| 4.0.30319.36415| 95,936| 27-Jul-2018| 21:39 \ncvtres_clr.exe| 12.0.52415.36415| 46,712| 27-Jul-2018| 21:41 \ncvtres_clr.exe| 12.0.52415.36415| 43,128| 27-Jul-2018| 21:39 \ncvtresui_clr.dll| 12.0.52415.36415| 20,144| 27-Jul-2018| 21:41 \ncvtresui_clr.dll| 12.0.52415.36415| 20,144| 27-Jul-2018| 21:39 \nDataSvcUtil.exe| 4.0.30319.36415| 73,336| 27-Jul-2018| 21:39 \ndfdll.dll| 4.0.30319.36415| 165,528| 27-Jul-2018| 21:41 \ndfdll.dll| 4.0.30319.36415| 141,976| 27-Jul-2018| 21:39 \ndfshim.dll.mui| 4.0.41209.0| 18,608| 27-Jul-2018| 21:41 \ndfshim.dll.mui| 4.0.41209.0| 18,600| 27-Jul-2018| 21:39 \ndfsvc.exe| 4.0.30319.36415| 23,160| 27-Jul-2018| 21:39 \ndiasymreader.dll| 12.0.52415.36415| 1,068,208| 27-Jul-2018| 21:41 \ndiasymreader.dll| 12.0.52415.36415| 859,824| 27-Jul-2018| 21:39 \ndw20.exe| 4.0.30319.36415| 51,320| 27-Jul-2018| 21:41 \ndw20.exe| 4.0.30319.36415| 45,176| 27-Jul-2018| 21:39 \nEdmGen.exe| 4.0.30319.36415| 85,624| 27-Jul-2018| 21:39 \nEventLogMessages.dll| 4.0.30319.36415| 804,552| 27-Jul-2018| 21:41 \nEventLogMessages.dll| 4.0.30319.36415| 804,552| 27-Jul-2018| 21:39 \nfiletracker.dll| 12.0.52415.36415| 262,832| 27-Jul-2018| 21:41 \nfiletracker.dll| 12.0.52415.36415| 226,992| 27-Jul-2018| 21:39 \nFileTrackerUI.dll| 12.0.52415.36415| 21,688| 27-Jul-2018| 21:41 \nFileTrackerUI.dll| 12.0.52415.36415| 21,688| 27-Jul-2018| 21:39 \nfusion.dll| 4.0.30319.36415| 92,832| 27-Jul-2018| 21:41 \nfusion.dll| 4.0.30319.36415| 74,904| 27-Jul-2018| 21:39 \nie.browser| | 5,166| 27-Jul-2018| 21:41 \nie.browser| | 5,166| 27-Jul-2018| 21:39 \nilasm.exe| 4.0.30319.36415| 363,640| 27-Jul-2018| 21:41 \nilasm.exe| 4.0.30319.36415| 297,080| 27-Jul-2018| 21:39 \nInstallPersistSqlState.sql| | 54,647| 27-Jul-2018| 21:41 \nInstallPersistSqlState.sql| | 54,647| 27-Jul-2018| 21:39 \nInstallSqlState.sql| | 54,427| 27-Jul-2018| 21:41 \nInstallSqlState.sql| | 54,427| 27-Jul-2018| 21:39 \nInstallSqlStateTemplate.sql| | 56,233| 27-Jul-2018| 21:41 \nInstallSqlStateTemplate.sql| | 56,233| 27-Jul-2018| 21:39 \nInstallUtil.exe| 4.0.30319.36415| 40,056| 27-Jul-2018| 21:41 \nInstallUtil.exe| 4.0.30319.36415| 40,568| 27-Jul-2018| 21:39 \nInstallUtilLib.dll| 4.0.30319.36415| 76,472| 27-Jul-2018| 21:41 \nInstallUtilLib.dll| 4.0.30319.36415| 68,280| 27-Jul-2018| 21:39 \nISymWrapper.dll| 4.0.30319.36415| 71,856| 27-Jul-2018| 21:41 \nISymWrapper.dll| 4.0.30319.36415| 71,856| 27-Jul-2018| 21:39 \njsc.exe| 12.0.52415.36415| 47,224| 27-Jul-2018| 21:39 \nlocale.nlp| | 419,632| 27-Jul-2018| 21:41 \nlocale.nlp| | 419,632| 27-Jul-2018| 21:39 \nMicrosoft.Activities.Build.dll| 4.0.30319.36415| 54,160| 27-Jul-2018| 21:39 \nMicrosoft.Build.Conversion.v4.0.dll| 4.0.30319.36415| 85,248| 27-Jul-2018| 21:39 \nMicrosoft.Build.dll| 4.0.30319.36415| 1,448,128| 27-Jul-2018| 21:39 \nMicrosoft.Build.Engine.dll| 4.0.30319.36415| 668,376| 27-Jul-2018| 21:39 \nMicrosoft.Build.Framework.dll| 4.0.30319.36415| 101,608| 27-Jul-2018| 21:39 \nMicrosoft.Build.Tasks.v4.0.dll| 4.0.30319.36415| 1,191,152| 27-Jul-2018| 21:39 \nMicrosoft.Build.Utilities.v4.0.dll| 4.0.30319.36415| 273,664| 27-Jul-2018| 21:39 \nMicrosoft.Common.OverrideTasks| | 6,297| 27-Jul-2018| 21:41 \nMicrosoft.Common.OverrideTasks| | 6,297| 27-Jul-2018| 21:39 \nMicrosoft.Common.targets| | 262,547| 27-Jul-2018| 21:41 \nMicrosoft.Common.targets| | 262,547| 27-Jul-2018| 21:39 \nMicrosoft.CSharp.dll| 4.0.30319.36415| 492,224| 27-Jul-2018| 21:39 \nMicrosoft.Data.Entity.Build.Tasks.dll| 4.0.30319.36415| 53,000| 27-Jul-2018| 21:39 \nMicrosoft.Data.Entity.targets| | 6,501| 27-Jul-2018| 21:43 \nMicrosoft.Internal.Tasks.Dataflow.dll| 4.0.30319.36415| 184,584| 27-Jul-2018| 21:39 \nMicrosoft.Transactions.Bridge.dll| 4.0.30319.36415| 407,824| 27-Jul-2018| 21:39 \nMicrosoft.Transactions.Bridge.Dtc.dll| 4.0.30319.36415| 131,848| 27-Jul-2018| 21:41 \nMicrosoft.Transactions.Bridge.Dtc.dll| 4.0.30319.36415| 131,336| 27-Jul-2018| 21:39 \nMicrosoft.VisualC.STLCLR.dll| 12.0.52415.36415| 50,920| 27-Jul-2018| 21:39 \nMicrosoft.Windows.ApplicationServer.Applications.dll| 4.0.30319.36415| 141,192| 27-Jul-2018| 21:39 \nMicrosoft.Windows.ApplicationServer.Applications.dll.mui| 4.0.30319.36415| 99,168| 27-Jul-2018| 21:41 \nMicrosoft.Windows.ApplicationServer.Applications.dll.mui| 4.0.30319.36415| 99,160| 27-Jul-2018| 21:39 \nMicrosoft.WinFX.targets| | 42,213| 27-Jul-2018| 21:41 \nMicrosoft.WinFX.targets| | 42,213| 27-Jul-2018| 21:39 \nMicrosoft.Workflow.Compiler.exe| 4.0.30319.36415| 32,888| 27-Jul-2018| 21:39 \nMicrosoft.WorkflowBuildExtensions.targets| | 7,537| 27-Jul-2018| 21:39 \nMicrosoft.Xaml.targets| | 19,848| 27-Jul-2018| 21:41 \nMicrosoft.Xaml.targets| | 19,848| 27-Jul-2018| 21:39 \nmicrosoft.build.commontypes.xsd| | 241,004| 27-Jul-2018| 21:41 \nmicrosoft.build.commontypes.xsd| | 241,004| 27-Jul-2018| 21:39 \nMicrosoft.JScript.dll| 12.0.52415.36415| 758,984| 27-Jul-2018| 21:39 \nMicrosoft.JScript.tlb| 12.0.52415.36415| 57,856| 27-Jul-2018| 21:41 \nMicrosoft.JScript.tlb| 12.0.52415.36415| 57,856| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.Compatibility.Data.dll| 12.0.52415.36415| 108,840| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.Compatibility.dll| 12.0.52415.36415| 360,208| 27-Jul-2018| 21:39 \nMicrosoft.VisualBasic.dll| 12.0.52415.36415| 651,488| 27-Jul-2018| 21:39 \nMicrosoft.VisualC.Dll| 12.0.52415.36415| 30,408| 27-Jul-2018| 21:39 \nMmcAspExt.dll| 4.0.30319.36415| 113,320| 27-Jul-2018| 21:41 \nMmcAspExt.dll| 4.0.30319.36415| 107,176| 27-Jul-2018| 21:39 \nMSBuild.exe| 4.0.30319.36415| 263,288| 27-Jul-2018| 21:41 \nMSBuild.exe| 4.0.30319.36415| 267,896| 27-Jul-2018| 21:39 \nmscordacwks.dll| 4.0.30319.36460| 1,731,208| 27-Jul-2018| 22:28 \nmscordacwks.dll| 4.0.30319.36460| 1,284,232| 27-Jul-2018| 21:43 \nmscordbi.dll| 4.0.30319.36460| 1,533,568| 27-Jul-2018| 22:28 \nmscordbi.dll| 4.0.30319.36460| 1,107,576| 27-Jul-2018| 21:43 \nmscoree.tlb| 4.0.30319.36415| 30,720| 27-Jul-2018| 21:41 \nmscoree.tlb| 4.0.30319.36415| 30,720| 27-Jul-2018| 21:39 \nmscoreei.dll| 4.0.30319.36415| 636,072| 27-Jul-2018| 21:41 \nmscoreei.dll| 4.0.30319.36415| 516,264| 27-Jul-2018| 21:39 \nmscoreeis.dll| 4.0.30319.36415| 32,936| 27-Jul-2018| 21:41 \nmscoreeis.dll| 4.0.30319.36415| 32,936| 27-Jul-2018| 21:39 \nmscorlib.dll| 4.0.30319.36460| 5,219,968| 27-Jul-2018| 22:28 \nmscorlib.dll| 4.0.30319.36460| 5,266,072| 27-Jul-2018| 21:43 \nmscorpe.dll| 4.0.30319.36415| 85,152| 27-Jul-2018| 21:41 \nmscorpe.dll| 4.0.30319.36415| 75,424| 27-Jul-2018| 21:39 \nmscorpehost.dll| 4.0.30319.36415| 169,648| 27-Jul-2018| 21:41 \nmscorpehost.dll| 4.0.30319.36415| 139,952| 27-Jul-2018| 21:39 \nmscorrc.dll| 4.0.30319.36415| 395,936| 27-Jul-2018| 21:41 \nmscorrc.dll| 4.0.30319.36415| 395,936| 27-Jul-2018| 21:39 \nmscorsecimpl.dll| 4.0.30319.36415| 127,160| 27-Jul-2018| 21:41 \nmscorsecimpl.dll| 4.0.30319.36415| 104,632| 27-Jul-2018| 21:39 \nmscorsecr.dll| 4.0.30319.36415| 38,056| 27-Jul-2018| 21:41 \nmscorsecr.dll| 4.0.30319.36415| 38,056| 27-Jul-2018| 21:39 \nmscorsn.dll| 4.0.30319.36415| 26,272| 27-Jul-2018| 21:41 \nmscorsn.dll| 4.0.30319.36415| 25,760| 27-Jul-2018| 21:39 \nmscorsvc.dll| 4.0.30319.36415| 523,424| 27-Jul-2018| 21:41 \nmscorsvc.dll| 4.0.30319.36415| 414,880| 27-Jul-2018| 21:39 \nmscorsvw.exe| 4.0.30319.36415| 124,024| 27-Jul-2018| 21:41 \nmscorsvw.exe| 4.0.30319.36415| 103,552| 27-Jul-2018| 21:39 \nVsVersion.dll| 12.0.52415.36415| 18,088| 27-Jul-2018| 21:41 \nVsVersion.dll| 12.0.52415.36415| 18,088| 27-Jul-2018| 21:39 \nngen.exe| 4.0.30319.36415| 171,128| 27-Jul-2018| 21:41 \nngen.exe| 4.0.30319.36415| 140,920| 27-Jul-2018| 21:39 \nnlssorting.dll| 4.0.30319.36415| 84,144| 27-Jul-2018| 21:41 \nnlssorting.dll| 4.0.30319.36415| 74,928| 27-Jul-2018| 21:39 \nnormalization.dll| 4.0.30319.36415| 34,488| 27-Jul-2018| 21:41 \nnormalization.dll| 4.0.30319.36415| 31,416| 27-Jul-2018| 21:39 \nPenIMC.dll| 4.0.30319.36415| 94,872| 27-Jul-2018| 21:41 \nPenIMC.dll| 4.0.30319.36415| 81,560| 27-Jul-2018| 21:39 \nPerfCounter.dll| 4.0.30319.36415| 241,840| 27-Jul-2018| 21:41 \nPerfCounter.dll| 4.0.30319.36415| 204,464| 27-Jul-2018| 21:39 \npeverify.dll| 4.0.30319.36460| 225,920| 27-Jul-2018| 22:28 \npeverify.dll| 4.0.30319.36460| 163,968| 27-Jul-2018| 21:43 \nPresentationBuildTasks.dll| 4.0.30319.36415| 604,536| 27-Jul-2018| 21:39 \nPresentationCore.dll| 4.0.30319.36415| 3,210,952| 27-Jul-2018| 21:41 \nPresentationCore.dll| 4.0.30319.36415| 3,226,976| 27-Jul-2018| 21:39 \nPresentationFramework.Aero.dll| 4.0.30319.36415| 249,232| 27-Jul-2018| 21:39 \npresentationframework.aerolite.dll| 4.0.30319.36415| 177,560| 27-Jul-2018| 21:39 \nPresentationFramework.Classic.dll| 4.0.30319.36415| 181,144| 27-Jul-2018| 21:39 \nPresentationFramework.Luna.dll| 4.0.30319.36415| 484,752| 27-Jul-2018| 21:39 \nPresentationFramework.Royale.dll| 4.0.30319.36415| 208,272| 27-Jul-2018| 21:39 \nPresentationFramework.dll| 4.0.30319.36415| 6,221,688| 27-Jul-2018| 21:39 \nPresentationFramework-SystemCore.dll| 4.0.30319.36415| 25,352| 27-Jul-2018| 21:39 \nPresentationFramework-SystemData.dll| 4.0.30319.36415| 23,816| 27-Jul-2018| 21:39 \nPresentationFramework-SystemDrawing.dll| 4.0.30319.36415| 24,336| 27-Jul-2018| 21:39 \nPresentationFramework-SystemXml.dll| 4.0.30319.36415| 24,832| 27-Jul-2018| 21:39 \nPresentationFramework-SystemXmlLinq.dll| 4.0.30319.36415| 22,800| 27-Jul-2018| 21:39 \nPresentationHost_v0400.dll| 4.0.30319.36415| 232,152| 27-Jul-2018| 21:41 \nPresentationHost_v0400.dll.mui| 4.0.30319.36415| 84,712| 27-Jul-2018| 21:41 \nPresentationHost_v0400.dll| 4.0.30319.36415| 186,072| 27-Jul-2018| 21:39 \nPresentationHost_v0400.dll.mui| 4.0.30319.36415| 84,720| 27-Jul-2018| 21:39 \nPresentationNative_v0400.dll| 4.0.30319.36415| 1,077,992| 27-Jul-2018| 21:41 \nPresentationNative_v0400.dll| 4.0.30319.36415| 790,248| 27-Jul-2018| 21:39 \nPresentationUI.dll| 4.0.30319.36415| 847,032| 27-Jul-2018| 21:39 \nReachFramework.dll| 4.0.30319.36415| 595,288| 27-Jul-2018| 21:39 \nRegAsm.exe| 4.0.30319.36415| 64,120| 27-Jul-2018| 21:41 \nRegAsm.exe| 4.0.30319.36415| 64,632| 27-Jul-2018| 21:39 \nRegSvcs.exe| 4.0.30319.36415| 44,664| 27-Jul-2018| 21:41 \nRegSvcs.exe| 4.0.30319.36415| 45,176| 27-Jul-2018| 21:39 \nregtlib.exe| 12.0.52415.36415| 94,328| 27-Jul-2018| 21:41 \nregtlib.exe| 12.0.52415.36415| 84,600| 27-Jul-2018| 21:39 \nsbscmp10.dll| 4.0.41209.0| 24,232| 27-Jul-2018| 21:41 \nsbscmp10.dll| 4.0.41209.0| 23,720| 27-Jul-2018| 21:39 \nServiceModelEvents.dll| 4.0.30319.36415| 18,128| 27-Jul-2018| 21:41 \nServiceModelEvents.dll.mui| 4.0.30319.36415| 43,736| 27-Jul-2018| 21:41 \nServiceModelEvents.dll.mui| 4.0.30319.36415| 43,744| 27-Jul-2018| 21:39 \nServiceModelEvents.dll| 4.0.30319.36415| 18,128| 27-Jul-2018| 21:39 \nServiceModelInstallRC.dll| 4.0.30319.36415| 18,136| 27-Jul-2018| 21:41 \nServiceModelInstallRC.dll.mui| 4.0.30319.36415| 19,688| 27-Jul-2018| 21:41 \nServiceModelInstallRC.dll.mui| 4.0.30319.36415| 19,688| 27-Jul-2018| 21:39 \nServiceModelInstallRC.dll| 4.0.30319.36415| 18,136| 27-Jul-2018| 21:39 \nServiceModelPerformanceCounters.dll| 4.0.30319.36415| 86,784| 27-Jul-2018| 21:41 \nServiceModelPerformanceCounters.dll.mui| 4.0.30319.36415| 47,376| 27-Jul-2018| 21:41 \nServiceModelPerformanceCounters.dll.mui| 4.0.30319.36415| 47,376| 27-Jul-2018| 21:39 \nServiceModelPerformanceCounters.dll| 4.0.30319.36415| 77,056| 27-Jul-2018| 21:39 \nServiceModelReg.exe| 4.0.30319.36415| 263,288| 27-Jul-2018| 21:41 \nServiceModelReg.exe| 4.0.30319.36415| 226,424| 27-Jul-2018| 21:39 \nServiceModelRegUI.dll| 4.0.30319.36415| 18,120| 27-Jul-2018| 21:41 \nServiceModelRegUI.dll.mui| 4.0.30319.36415| 37,592| 27-Jul-2018| 21:41 \nServiceModelRegUI.dll.mui| 4.0.30319.36415| 37,592| 27-Jul-2018| 21:39 \nServiceModelRegUI.dll| 4.0.30319.36415| 18,120| 27-Jul-2018| 21:39 \nServiceMonikerSupport.dll| 4.0.30319.36450| 28,872| 27-Jul-2018| 21:41 \nServiceMonikerSupport.dll| 4.0.30319.36450| 28,360| 27-Jul-2018| 21:39 \nSMDiagnostics.dll| 4.0.30319.36450| 73,328| 27-Jul-2018| 21:39 \nSMSvcHost.exe| 4.0.30319.36415| 139,896| 27-Jul-2018| 21:39 \nSOS.dll| 4.0.30319.36460| 822,888| 27-Jul-2018| 22:28 \nSOS.dll| 4.0.30319.36460| 762,472| 27-Jul-2018| 21:43 \nSystem.Speech.dll| 4.0.30319.36415| 686,424| 27-Jul-2018| 21:39 \nsysglobl.dll| 4.0.30319.36415| 133,264| 27-Jul-2018| 21:39 \nSystem.Activities.Core.Presentation.dll| 4.0.30319.36415| 718,256| 27-Jul-2018| 21:39 \nSystem.Activities.dll| 4.0.30319.36450| 1,582,704| 27-Jul-2018| 21:39 \nSystem.Activities.DurableInstancing.dll| 4.0.30319.36415| 144,176| 27-Jul-2018| 21:39 \nSystem.Activities.Presentation.dll| 4.0.30319.36415| 2,140,568| 27-Jul-2018| 21:39 \nSystem.AddIn.Contract.dll| 4.0.30319.36415| 52,440| 27-Jul-2018| 21:39 \nSystem.AddIn.dll| 4.0.30319.36415| 163,512| 27-Jul-2018| 21:39 \nSystem.Collections.Concurrent.dll| 4.0.30319.36415| 29,456| 27-Jul-2018| 21:39 \nSystem.Collections.dll| 4.0.30319.36415| 29,896| 27-Jul-2018| 21:39 \nSystem.ComponentModel.Annotations.dll| 4.0.30319.36415| 29,992| 27-Jul-2018| 21:39 \nSystem.ComponentModel.Composition.dll| 4.0.30319.36415| 312,104| 27-Jul-2018| 21:39 \nsystem.componentmodel.composition.registration.dll| 4.0.30319.36415| 62,848| 27-Jul-2018| 21:39 \nSystem.ComponentModel.DataAnnotations.dll| 4.0.30319.36415| 120,640| 27-Jul-2018| 21:39 \nSystem.ComponentModel.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.ComponentModel.EventBasedAsync.dll| 4.0.30319.36415| 29,504| 27-Jul-2018| 21:39 \nSystem.Core.dll| 4.0.30319.36415| 1,271,976| 27-Jul-2018| 21:39 \nSystem.Data.DataSetExtensions.dll| 4.0.30319.36415| 72,464| 27-Jul-2018| 21:39 \nSystem.Data.Entity.Design.dll| 4.0.30319.36415| 1,087,208| 27-Jul-2018| 21:39 \nSystem.Data.Entity.dll| 4.0.30319.36415| 4,099,280| 27-Jul-2018| 21:39 \nSystem.Data.Linq.dll| 4.0.30319.36415| 698,568| 27-Jul-2018| 21:39 \nUIAutomationClient.dll| 4.0.30319.36415| 178,536| 27-Jul-2018| 21:39 \nUIAutomationClientsideProviders.dll| 4.0.30319.36415| 365,984| 27-Jul-2018| 21:39 \nUIAutomationProvider.dll| 4.0.30319.36415| 48,496| 27-Jul-2018| 21:39 \nUIAutomationTypes.dll| 4.0.30319.36415| 105,832| 27-Jul-2018| 21:39 \nwebengine.dll| 4.0.30319.36430| 26,768| 27-Jul-2018| 21:41 \nwebengine.dll| 4.0.30319.36430| 24,720| 27-Jul-2018| 21:39 \nwebengine4.dll| 4.0.30319.36430| 621,200| 27-Jul-2018| 21:41 \nwebengine4.dll| 4.0.30319.36430| 509,584| 27-Jul-2018| 21:39 \nWindowsBase.dll| 4.0.30319.36415| 1,241,936| 27-Jul-2018| 21:39 \nWindowsFormsIntegration.dll| 4.0.30319.36415| 102,784| 27-Jul-2018| 21:39 \nWMINet_Utils.dll| 4.0.30319.36415| 174,256| 27-Jul-2018| 21:41 \nWMINet_Utils.dll| 4.0.30319.36415| 126,136| 27-Jul-2018| 21:39 \nWorkflowServiceHostPerformanceCounters.dll| 4.0.30319.36450| 84,776| 27-Jul-2018| 21:41 \nWorkflowServiceHostPerformanceCounters.dll.mui| 4.0.30319.36415| 24,368| 27-Jul-2018| 21:41 \nWorkflowServiceHostPerformanceCounters.dll.mui| 4.0.30319.36415| 24,368| 27-Jul-2018| 21:39 \nWorkflowServiceHostPerformanceCounters.dll| 4.0.30319.36450| 75,536| 27-Jul-2018| 21:39 \nwpf-etw.man| | 151,330| 27-Jul-2018| 21:39 \nWPFFontCache_v0400.exe.mui| 4.0.30319.36415| 19,168| 27-Jul-2018| 21:41 \nWPFFontCache_v0400.exe.mui| 4.0.30319.36415| 19,168| 27-Jul-2018| 21:39 \nWPFFontCache_v0400.exe| 4.0.30319.36415| 25,720| 27-Jul-2018| 21:41 \nWPFFontCache_v0400.exe| 4.0.30319.36415| 24,696| 27-Jul-2018| 21:39 \nwpfgfx_v0400.dll| 4.0.30319.36415| 2,108,592| 27-Jul-2018| 21:41 \nwpfgfx_v0400.dll| 4.0.30319.36415| 1,648,304| 27-Jul-2018| 21:39 \nWsatConfig.exe| 4.0.30319.36415| 155,256| 27-Jul-2018| 21:39 \nXamlBuildTask.dll| 4.0.30319.36415| 133,976| 27-Jul-2018| 21:39 \nXsdBuildTask.dll| 4.0.30319.36415| 68,280| 27-Jul-2018| 21:39 \nThirdPartyNotices.txt| | 20,126| 27-Jul-2018| 21:43 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 678,584| 27-Jul-2018| 22:28 \nmsvcp120_clr0400.dll| 12.0.52460.36460| 536,736| 27-Jul-2018| 21:43 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 869,536| 27-Jul-2018| 22:28 \nmsvcr120_clr0400.dll| 12.0.52460.36460| 875,672| 27-Jul-2018| 21:43 \nSystem.Data.Services.Client.dll| 4.0.30319.36415| 448,240| 27-Jul-2018| 21:39 \nSystem.Data.Services.Design.dll| 4.0.30319.36415| 176,368| 27-Jul-2018| 21:39 \nSystem.Data.Services.dll| 4.0.30319.36415| 684,248| 27-Jul-2018| 21:39 \nSystem.Diagnostics.Contracts.dll| 4.0.30319.36415| 29,960| 27-Jul-2018| 21:39 \nSystem.Diagnostics.Debug.dll| 4.0.30319.36415| 29,424| 27-Jul-2018| 21:39 \nSystem.Diagnostics.Tools.dll| 4.0.30319.36415| 29,424| 27-Jul-2018| 21:39 \nSystem.Diagnostics.Tracing.dll| 4.0.30319.36415| 29,440| 27-Jul-2018| 21:39 \nSystem.DirectoryServices.AccountManagement.dll| 4.0.30319.36415| 297,776| 27-Jul-2018| 21:39 \nsystem.dynamic.dll| 4.0.30319.36415| 134,320| 27-Jul-2018| 21:39 \nSystem.Dynamic.Runtime.dll| 4.0.30319.36415| 29,928| 27-Jul-2018| 21:39 \nSystem.Globalization.dll| 4.0.30319.36415| 29,400| 27-Jul-2018| 21:39 \nSystem.IdentityModel.dll| 4.0.30319.36450| 1,093,784| 27-Jul-2018| 21:39 \nSystem.IdentityModel.Selectors.dll| 4.0.30319.36415| 145,680| 27-Jul-2018| 21:39 \nSystem.IdentityModel.Services.dll| 4.0.30319.36450| 199,912| 27-Jul-2018| 21:39 \nSystem.IO.dll| 4.0.30319.36415| 29,336| 27-Jul-2018| 21:39 \nSystem.IO.Log.dll| 4.0.30319.36415| 134,992| 27-Jul-2018| 21:39 \nSystem.Linq.dll| 4.0.30319.36415| 29,344| 27-Jul-2018| 21:39 \nSystem.Linq.Expressions.dll| 4.0.30319.36415| 31,472| 27-Jul-2018| 21:39 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 7 SP1, Server 2008 R2 SP1, and Server 2008 SP2 (KB 4344149)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344149", "href": "https://support.microsoft.com/en-us/help/4344149", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:14:07", "description": "None\n## Summary\n\nThis security update resolves an information disclosure vulnerability in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments. The vulnerability is caused when .NET Framework is used in high-load/high-density network connections in which content from one stream can blend into another stream.To exploit the vulnerability, an attacker who can access one tenant in a high-load/high-density environment could potentially trigger multi-tenanted data exposure from one customer to another.This security update addresses the vulnerability by correcting the way that .NET Framework handles high-load/high-density network connections.To learn more about this vulnerability, see [Microsoft Common Vulnerabilities and Exposures CVE-2018-8360](<https://portal.msrc.microsoft.com/security-guidance/advisory/CVE-2018-8360>).**Important**\n\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Additional information about this security update\n\nFor more information about this security update as it relates to Windows 7 Service Pack 1 (SP1) and Windows Server 2008 R2 SP1, see the following article in the Microsoft Knowledge Base:[4345679](<https://support.microsoft.com/help/4345679>) Security Only updates for .NET Framework 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4345679)\n\n## How to obtain and install the update\n\n### Method 1: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=4345679>). \n\n\n### Method 2: Windows Software Update Services (WSUS)\n\nOn your WSUS server, follow these steps:\n\n 1. Click **Start**, click **Administrative Tools**, and then click **Microsoft Windows Server Update Services 3.0**.\n 2. Expand **ComputerName**, and then click **Action**.\n 3. Click **Import Updates**.\n 4. WSUS opens a browser window in which you may be prompted to install an ActiveX control. You must install the ActiveX control to continue.\n 5. After the ActiveX control is installed, you see the **Microsoft Update Catalog** screen. Type **4345679** in the **Search** box, and then click **Search**.\n 6. Locate the .NET Framework packages that match the operating systems, languages, and processors in your environment. Click **Add** to add them to your basket.\n 7. After you select all the packages that you require, click **View Basket**.\n 8. To import the packages to your WSUS server, click **Import**.\n 9. After the packages are imported, click **Close** to return to WSUS.\nThe updates are now available for installation through WSUS.\n\n### Update deployment information\n\nFor deployment details for this security update, go to the following article in the Microsoft Knowledge Base:[20180814](<https://support.microsoft.com/help/20180814>) Security update deployment information: August 14, 2018\n\n### Update removal information\n\n**Note** We do not recommend that you remove any security update. To remove this update, use the **Programs and Features** item in Control Panel.\n\n### Update restart information\n\nThis update does not require a system restart after you apply it unless files that are being updated are locked or are being used.\n\n### Update replacement information\n\nThis update replaces update [3142024](<https://support.microsoft.com/help/3142024>).\n\n## File information\n\n## File hash \n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows6.1-KB4344177-ia64.msu| EB3C241C084EE84B5C247CE3651D4EDBD9054550| 242D1EBE4AEA545127595BD2B962CE5A8A34A9E27B8C4E5C9F982261C44539ED \nWindows6.1-KB4344177-x64.msu| AC4E288D33FEAD366BCBAD5135D1AA6BC4D787F2| 582D062D637EDC2C98D93264E6C5BF3CED672A2ACB6B34405C7549B2642CFCF3 \nWindows6.1-KB4344177-x86.msu| 46D7719CB93D9DE74F2399A864F66A3361079676| 01FF814EB93C807977FF51A0929B3D976A52FB5D06D6A16374F215C0DC50AC29 \n \n\n\n## File attributes \n\nThe English (United States) version of this update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.**For all supported x86-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nbig5.nlp| | 66,728| 16-Jun-2018| 05:11 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:11 \nksc.nlp| | 116,756| 16-Jun-2018| 05:11 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:12 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:12 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:12 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:12 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:12 \nprc.nlp| | 83,748| 16-Jun-2018| 05:12 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:12 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:12 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:12 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:13 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 16:53 \n**For all supported x64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 16-Jun-2018| 05:09 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:09 \nksc.nlp| | 116,756| 16-Jun-2018| 05:09 \nmscorlib.dll| 2.0.50727.8793| 4,571,136| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:10 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:10 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:10 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:10 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:10 \nprc.nlp| | 83,748| 16-Jun-2018| 05:10 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:10 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:10 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:10 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:10 \nmscordacwks.dll| 2.0.50727.8793| 1,758,784| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 495,232| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 10,008,632| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 486,008| 24-Jul-2018| 16:53 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nbig5.nlp| | 66,728| 16-Jun-2018| 05:11 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:11 \nksc.nlp| | 116,756| 16-Jun-2018| 05:11 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:12 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:12 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:12 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:12 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:12 \nprc.nlp| | 83,748| 16-Jun-2018| 05:12 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:12 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:12 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:12 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:13 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 16:53 \n**For all supported IA64-based systems**File name| File version| File size| Date| Time \n---|---|---|---|--- \nbig5.nlp| | 66,728| 16-Jun-2018| 05:14 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:14 \nksc.nlp| | 116,756| 16-Jun-2018| 05:14 \nmscorlib.dll| 2.0.50727.8793| 4,014,080| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:14 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:14 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:14 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:14 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:14 \nprc.nlp| | 83,748| 16-Jun-2018| 05:14 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:14 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:14 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:14 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:15 \nmscordacwks.dll| 2.0.50727.8793| 3,083,400| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 602,752| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 20,404,864| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 873,592| 24-Jul-2018| 16:53 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nsystem.dll| 2.0.50727.8791| 3,207,168| 13-Jul-2018| 16:20 \nbig5.nlp| | 66,728| 16-Jun-2018| 05:11 \nbopomofo.nlp| | 82,172| 16-Jun-2018| 05:11 \nksc.nlp| | 116,756| 16-Jun-2018| 05:11 \nmscorlib.dll| 2.0.50727.8793| 4,554,752| 24-Jul-2018| 16:53 \nnormidna.nlp| | 59,342| 16-Jun-2018| 05:12 \nnormnfc.nlp| | 45,794| 16-Jun-2018| 05:12 \nnormnfd.nlp| | 39,284| 16-Jun-2018| 05:12 \nnormnfkc.nlp| | 66,384| 16-Jun-2018| 05:12 \nnormnfkd.nlp| | 60,294| 16-Jun-2018| 05:12 \nprc.nlp| | 83,748| 16-Jun-2018| 05:12 \nprcp.nlp| | 83,748| 16-Jun-2018| 05:12 \nsortkey.nlp| | 262,148| 16-Jun-2018| 05:12 \nsorttbls.nlp| | 20,320| 16-Jun-2018| 05:12 \nxjis.nlp| | 28,288| 16-Jun-2018| 05:13 \nmscordacwks.dll| 2.0.50727.8793| 991,808| 24-Jul-2018| 16:53 \nmscorsvc.dll| 2.0.50727.8793| 231,992| 24-Jul-2018| 16:53 \nmscorwks.dll| 2.0.50727.8793| 5,948,472| 24-Jul-2018| 16:53 \nsos.dll| 2.0.50727.8793| 391,216| 24-Jul-2018| 16:53 \n \n## How to obtain help and support for this security update\n\n * Help for installing updates: [Windows Update FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>)\n * Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)\n * Help for protecting your Windows-based products and services from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)\n * Local support according to your country: [International Support](<http://support.microsoft.com>)\n", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Description of the Security Only update for .NET Framework 3.5.1 for Windows 7 SP1 and Server 2008 R2 SP1 (KB 4344177)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8360"], "modified": "2018-08-14T07:00:00", "id": "KB4344177", "href": "https://support.microsoft.com/en-us/help/4344177", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2022-08-24T11:13:55", "description": "None\n## Improvements and fixes\n\nThis security update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Server](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&reserved=0>) guidance KB article. (_These registry settings are disabled by default for Windows Server OS editions.)_\n * Provides protections against an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore ([CVE-2018-3665](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180016>)) for 32-Bit (x86) versions of Windows.\nFor more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nMicrosoft is not currently aware of any issues with this update.\n\n## How to get this update\n\nThis update is now available for installation through WSUS. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343896>) website.**File information**For a list of the files that are provided in this update, download the [file information for update 4343896](<http://download.microsoft.com/download/1/2/C/12C9BB98-1209-4D80-B837-FFC63AF7FCD0/4343896.csv>). \n", "cvss3": {"exploitabilityScore": 1.0, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.0, "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343896 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-3665", "CVE-2018-8404"], "modified": "2018-08-14T07:00:00", "id": "KB4343896", "href": "https://support.microsoft.com/en-us/help/4343896", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-11-10T10:23:51", "description": "None\n## Summary\n\nThis security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see [Microsoft Common Vulnerabilities and Exposures](<https://portal.msrc.microsoft.com/en-US/security-guidance/>). Additionally, see the following articles for more information about this cumulative update:\n\n * [Windows 7 SP1 and Windows Server 2008 R2 SP1 update history](<https://support.microsoft.com/help/4009469/windows-7-sp1-windows-server-2008-r2-sp1-update-history>)\n * [Windows Server 2012 update history](<https://support.microsoft.com/help/4009471/windows-server-2012-update-history>)\n * [Windows 8.1 and Windows Server 2012 R2 update history](<https://support.microsoft.com/help/4009470/windows-8-1-windows-server-2012-r2-update-history>)\n * [Windows 10 and Windows Server 2016 update history](<https://support.microsoft.com/help/4000825/windows-10-and-windows-server-2016-update-history>)\n**Important **\n\n * The fixes that are included in this Security Update for Internet Explorer (KB 4343205) are also included in the August 2018 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are in this update.\n * If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer (KB 4343205), the August 2018 Security Only Quality Update, and the August 2018 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure that the desired updates are deployed.\n * This Security Update for Internet Explorer is not applicable for installation on a computer on which the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from August 2018 (or a later month) is already installed. This is because those updates contain all the fixes that are in this Security Update for Internet Explorer.\n * If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see [Add language packs to Windows](<https://technet.microsoft.com/en-us/library/hh825699>).\n\n## Known issues\n\n**Symptom**| **Workaround** \n---|--- \nIn Internet Explorer 11, a blank page may appear for some redirects. Additionally, if you open a site that uses Active Directory Federation Services (AD FS) or Single sign-on (SSO), the site may be unresponsive.| Refreshing the address bar URL may allow the page to finally load completely. To resolve this issue, apply update [KB4459022](<https://support.microsoft.com/help/4459022>). \nAfter installing this update, you may observe decreased performance in Internet Explorer 11 when roaming profiles are used or when the Microsoft Compatibility List is not used.| This issue is resolved in [KB4463376](<http://support.microsoft.com/kb/4463376>). \n \n## How to get and install the update \n\n### Method 1: Microsoft Update\n\nThis update is available through Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically.For more information about how to get security updates automatically, see Windows Update: FAQ.**Note** For Windows RT and Windows RT 8.1, this update is available through Microsoft Update only.\n\n### Method 2: Microsoft Update Catalog\n\nTo get the stand-alone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/search.aspx?q=KB4343205>) website.\n\n## Deployment information\n\nFor deployment details for this security update, see the following article in the Microsoft Knowledge Base:[Security update deployment information: August 14, 2018](<https://support.microsoft.com/en-us/help/20180814>)\n\n## More Information\n\n## \n\n__\n\nHow to get help and support for this security update\n\nHelp for installing updates: [Windows Update: FAQ](<https://support.microsoft.com/ph/6527>)Security solutions for IT professionals: [TechNet Security Support and Troubleshooting](<https://technet.microsoft.com/security/bb980617.aspx>)Help for protecting your Windows-based computer from viruses and malware: [Microsoft Secure](<https://support.microsoft.com/contactus/cu_sc_virsec_master>)Local support according to your country: [International Support](<https://www.microsoft.com/en-us/locale.aspx>)\n\nFile informationFor a list of the files that are provided in this cumulative update, download the [file information for cumulative update 4343205](<http://download.microsoft.com/download/A/7/D/A7DE545B-461E-4B74-944B-06E57A214224/4343205.csv>).\n\n## File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nWindows8.1-KB4343205-arm.msu| 31615EDDA9EF07B2590A8347B9211A957C863218| 54064E3C9F4C190B382AFA79E8BB26E7453039FA110BFCF23419DD6EFB42F336 \nWindows8.1-KB4343205-x86.msu| 272963AC6B592B1763793C6DCFE500F156E033D4| 8A1F5E6BC5773B6D3C25714B1F051DF5ECC3FBC96222769B69A0E3A5BF5C3E35 \nWindows8.1-KB4343205-x64.msu| 79C8CC1B7816FE6538B7A07F2D91FB4EF3E03151| B32BEB09702FAA123872816E07403BABE589D21CD172D41E8DA1C7F15844C323 \nWindows8-RT-KB4343205-x64.msu| A8ADE65F495083C92FD58F352B46FE5590BE9AEA| 98EDD1CA4C4B61AEC631F609C52C0C52A95F30358C9BAC755575E193A37927C9 \nIE11-Windows6.1-KB4343205-X64.msu| C42CDA12A762231114883CCD7322A29FB2146036| 664F70E129D78679C28253059118E2BA71DC55C75D108BC2C493A051B8A4D34C \nIE11-Windows6.1-KB4343205-X86.msu| 35F20D3A0A053949A1E514D27018CC3D39055455| 781205BF1EFE1150E5628663D50005703D96D4D92E615A4333657D03D887F7AD \nIE9-Windows6.0-KB4343205-X86.msu| 47CCB42BECC066C4394E871759532F18CAF9EEDE| B9B80CDEB6698B9039C76410CE3926EAE01760611DE6630C25EE31E23A0D1D8D \nIE9-Windows6.0-KB4343205-X64.msu| B118B05F41E74C73F0CFCEDC86B7F01CDDDB0106| 484232CA3550BA3420B2FA9E89FEDE2876FB1CA715019B20EFF03E7CE6C3592D\n", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "Cumulative security update for Internet Explorer: August 14, 2018", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-8385"], "modified": "2018-08-14T07:00:00", "id": "KB4343205", "href": "https://support.microsoft.com/en-us/help/4343205", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-08-24T11:13:56", "description": "None\n## Improvements and fixes\n\nThis security update includes quality improvements. No new operating system features are being introduced in this update. Key changes include:\n\n * Provides protections against a new speculative execution side-channel vulnerability known as L1 Terminal Fault (L1TF) that affects Intel\u00ae Core\u00ae processors and Intel\u00ae Xeon\u00ae processors ([CVE-2018-3620](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>) and [CVE-2018-3646](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018>)). Make sure previous OS protections against Spectre Variant 2 and Meltdown vulnerabilities are enabled using the registry settings outlined in the [Windows Client](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4073119%2Fprotect-against-speculative-execution-side-channel-vulnerabilities-in&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344611384&sdata=O0oGLDQ41ci60VkHx848zLZpCFVpy%2B5H%2Bwu1sNXuG%2FA%3D&reserved=0>) and [Windows Server](<https://apac01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.microsoft.com%2Fen-us%2Fhelp%2F4072698%2Fwindows-server-guidance-to-protect-against-the-speculative-execution&data=02%7C01%7C%7C5f093a5931474f6f371408d5fba393a8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636691602344621389&sdata=3AsCxE7BxWnxLjOiS3fBBT%2FNJ144HgvwBotv%2FazrX%2Fk%3D&reserved=0>) guidance KB articles. (_These registry settings are enabled by default for Windows Client OS editions, but disabled by default for Windows Server OS editions._)\n * Addresses an issue that causes high CPU usage that results in performance degradation on some systems with Family 15h and 16h AMD processors. This issue occurs after installing the June 2018 or July 2018 Windows updates from Microsoft and the AMD microcode updates that address Spectre Variant 2 ([CVE-2017-5715](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002>) \u2013 Branch Target Injection).\n * Provides protections against an additional vulnerability involving side-channel speculative execution known as Lazy Floating Point (FP) State Restore ([CVE-2018-3665](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180016>)) for 32-Bit (x86) versions of Windows.\nFor more information about the resolved security vulnerabilities, see the [Security Update Guide](<https://portal.msrc.microsoft.com/security-guidance>).\n\n## Known issues in this update\n\nMicrosoft is not currently aware of any issues with this update.\n\n## How to get this update\n\nThis update is now available for installation through WSUS. To get the standalone package for this update, go to the [Microsoft Update Catalog](<http://catalog.update.microsoft.com/v7/site/Search.aspx?q=KB4343899>) website.**File information**For a list of the files that are provided in this update, download the [file information for update 4343899](<http://download.microsoft.com/download/8/3/5/8352C7F8-B986-438F-88A1-5D96B6F174AF/4343899.csv>).\n", "cvss3": {"exploitabilityScore": 1.6, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2018-08-14T07:00:00", "type": "mskb", "title": "August 14, 2018\u2014KB4343899 (Security-only update)", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2017-5715", "CVE-2018-3620", "CVE-2018-3646", "CVE-2018-3665", "CVE-2018-8316"], "modified": "2018-08-14T07:00:00", "id": "KB4343899", "href": "https://support.microsoft.com/en-us/help/4343899", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2021-10-19T20:36:43", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-08-14T18:50:42", "type": "redhat", "title": "(RHSA-2018:2389) Important: kernel security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646"], "modified": "2018-08-14T18:55:54", "id": "RHSA-2018:2389", "href": "https://access.redhat.com/errata/RHSA-2018:2389", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-10-19T20:37:01", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-08-29T18:04:28", "type": "redhat", "title": "(RHSA-2018:2602) Important: kernel security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646"], "modified": "2018-08-29T18:07:03", "id": "RHSA-2018:2602", "href": "https://access.redhat.com/errata/RHSA-2018:2602", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-10-19T20:37:52", "description": "The rhev-hypervisor7 package provides a Red Hat Enterprise Virtualization Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes everything necessary to run and manage virtual machines: A subset of the Red Hat Enterprise Linux operating environment and the Red Hat Enterprise Virtualization Agent.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-08-15T15:14:04", "type": "redhat", "title": "(RHSA-2018:2404) Important: rhev-hypervisor7 security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646"], "modified": "2018-08-15T15:15:14", "id": "RHSA-2018:2404", "href": "https://access.redhat.com/errata/RHSA-2018:2404", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-10-19T20:37:58", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.\n\nBug Fix(es):\n\n* Due to a bug in a CPU's speculative execution engine, the CPU could previously leak data from other processes on the system, including passwords, encryption keys, or other sensitive information. With this update, the kernel build requirements have been updated to the GNU Compiler Collection (GCC) compiler version that has the support for Expoline for IBM z Systems. As a result, data leak no longer occurs under the described circumstances. (BZ#1577761)", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-08-14T18:50:39", "type": "redhat", "title": "(RHSA-2018:2388) Important: kernel security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646"], "modified": "2018-08-14T19:08:40", "id": "RHSA-2018:2388", "href": "https://access.redhat.com/errata/RHSA-2018:2388", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-10-19T20:39:49", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting these issues.", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-08-29T18:05:21", "type": "redhat", "title": "(RHSA-2018:2603) Important: kernel security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646"], "modified": "2018-09-06T18:55:21", "id": "RHSA-2018:2603", "href": "https://access.redhat.com/errata/RHSA-2018:2603", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-10-19T20:38:34", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-14T19:27:15", "type": "redhat", "title": "(RHSA-2018:2393) Important: kernel security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10901", "CVE-2018-3620", "CVE-2018-3646"], "modified": "2018-08-14T19:32:37", "id": "RHSA-2018:2393", "href": "https://access.redhat.com/errata/RHSA-2018:2393", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-19T20:39:41", "description": "The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2018-08-15T10:10:49", "type": "redhat", "title": "(RHSA-2018:2403) Important: redhat-virtualization-host security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-5390"], "modified": "2018-08-15T10:12:00", "id": "RHSA-2018:2403", "href": "https://access.redhat.com/errata/RHSA-2018:2403", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-10-19T20:39:24", "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\n* The kernel-rt packages have been upgraded to the 3.10.0-693.37.1 source tree, which provides a number of bug fixes over the previous version. (BZ#1599860)", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-08-14T19:27:26", "type": "redhat", "title": "(RHSA-2018:2396) Important: kernel-rt security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3639", "CVE-2018-3646"], "modified": "2018-08-14T19:32:56", "id": "RHSA-2018:2396", "href": "https://access.redhat.com/errata/RHSA-2018:2396", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-10-19T20:38:47", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-14T19:27:07", "type": "redhat", "title": "(RHSA-2018:2391) Important: kernel security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10901", "CVE-2018-3620", "CVE-2018-3646"], "modified": "2018-08-14T19:37:05", "id": "RHSA-2018:2391", "href": "https://access.redhat.com/errata/RHSA-2018:2391", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-19T20:38:53", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639.\n\nBug Fix(es):\n\n* Previously, configurations with the little-endian variant of IBM Power Systems CPU architectures and Hard Disk Drives (HDD) designed according to Nonvolatile Memory Express (NVMe) open standards, experienced crashes during shutdown or reboot due to race conditions of CPUs. As a consequence, the sysfs pseudo file system threw a stack trace report about an attempt to create a duplicate entry in sysfs. This update modifies the source code so that the irq_dispose_mapping() function is called first and the msi_bitmap_free_hwirqs() function is called afterwards. As a result, the race condition no longer appears in the described scenario. (BZ#1570510)\n\n* When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586147)\n\n* During a balloon reset, page pointers were not correctly initialized after unmapping the memory. Consequently, on the VMware ESXi hypervisor with \"Fault Tolerance\" and \"ballooning\" enabled, the following messages repeatedly occurred in the kernel log:\n\n[3014611.640148] WARNING: at mm/vmalloc.c:1491 __vunmap+0xd3/0x100()\n[3014611.640269] Trying to vfree() nonexistent vm area (ffffc90000697000)\n\nWith this update, the underlying source code has been fixed to initialize page pointers properly. As a result, the mm/vmalloc.c warnings no longer occur under the described circumstances. (BZ#1595600)", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.6, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 4.0}, "published": "2018-08-14T18:50:34", "type": "redhat", "title": "(RHSA-2018:2387) Important: kernel security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3639", "CVE-2018-3646"], "modified": "2018-08-14T19:00:15", "id": "RHSA-2018:2387", "href": "https://access.redhat.com/errata/RHSA-2018:2387", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-10-19T20:38:32", "description": "The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2018-08-16T05:04:33", "type": "redhat", "title": "(RHSA-2018:2402) Important: rhvm-appliance security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646", "CVE-2018-5390"], "modified": "2018-08-16T05:06:17", "id": "RHSA-2018:2402", "href": "https://access.redhat.com/errata/RHSA-2018:2402", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-10-19T20:41:11", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-14T19:27:13", "type": "redhat", "title": "(RHSA-2018:2392) Important: kernel security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10901", "CVE-2018-3620", "CVE-2018-3646"], "modified": "2018-08-14T19:33:05", "id": "RHSA-2018:2392", "href": "https://access.redhat.com/errata/RHSA-2018:2392", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-19T20:39:10", "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\n* kernel: kvm: vmx: host GDT limit corruption (CVE-2018-10901)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646; Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting CVE-2018-3639; and Vegard Nossum (Oracle Corporation) for reporting CVE-2018-10901.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.9}, "published": "2018-08-14T19:27:17", "type": "redhat", "title": "(RHSA-2018:2394) Important: kernel security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-10901", "CVE-2018-3620", "CVE-2018-3639", "CVE-2018-3646"], "modified": "2018-08-14T19:32:28", "id": "RHSA-2018:2394", "href": "https://access.redhat.com/errata/RHSA-2018:2394", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "ibm": [{"lastseen": "2022-06-28T21:59:57", "description": "## Summary\n\nIBM Security Guardium has addressed the following vulnerabilities\n\n## Vulnerability Details\n\n**CVEID:** [CVE-2018-3646](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646>) \n**DESCRIPTION:** Multiple Intel CPU''s could allow a local attacker to obtain sensitive information, caused by a flaw in the CPU speculative branch instruction execution feature. By conducting targeted cache side-channel attacks and via a terminal page fault, an attacker with guest OS privilege could exploit this vulnerability to leak information residing in the L1 data cache and read data belonging to different security contexts. \nCVSS Base Score: 7.1 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148319> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\n**CVEID:** [CVE-2018-3620](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620>) \n**DESCRIPTION:** Multiple Intel CPU''s could allow a local attacker to obtain sensitive information, caused by a flaw in the CPU speculative branch instruction execution feature. By conducting targeted cache side-channel attacks and via a terminal page fault, an attacker could exploit this vulnerability to leak information residing in the L1 data cache and read data belonging to different security contexts. Note: This vulnerability is also known as the \"L1 Terminal Fault (L1TF)\" or \"Foreshadow\" attack. \nCVSS Base Score: 7.1 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148318> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\n## Affected Products and Versions\n\n**Affected IBM Security Guardium **\n\n| \n\n**Affected Versions** \n \n---|--- \nIBM Security Guardium | 10.0 - 10.5 \nIBM Security Guardium | 9.0 - 9.5 \n \n## Remediation/Fixes\n\n**Product**\n\n| \n\n**VRMF**\n\n| \n\n**Remediation / First Fix** \n \n---|---|--- \nIBM Security Guardium | 10.0 - 10.5 | \n\nCustomers can upgrade to version 10.6 by downloading from here:\n\nhttp://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&product=ibm/Information+Management/InfoSphere+Guardium&release=10.0&platform=All&function=fixId&fixids=SqlGuard_10.0p600_GPU_Nov-2018-V10.6&includeSupersedes=0&source=fc\n\nOr\n\nCustomers currently on version 10.5 with patch 10.0p512 installed can upgrade version 10.5 with bundle 10.0p520 from here:\n\nhttp://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&product=ibm/Information+Management/InfoSphere+Guardium&release=10.0&platform=All&function=fixId&fixids=SqlGuard_10.0p520_Bundle_Dec-06-2018&includeSupersedes=0&source=fc \n \nIBM Security Guardium | 9.0 - 9.5 | http://www.ibm.com/support/fixcentral/swg/quickorder?parent=IBM%20Security&product=ibm/Information+Management/InfoSphere+Guardium&release=9.0&platform=All&function=fixId&fixids=SqlGuard_9.0p775_CombinedFixPackForGPU750_64-bit&includeSupersedes=0&source=fc \n \n## Workarounds and Mitigations\n\nNone\n\n## Get Notified about Future Security Bulletins\n\nSubscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html>) to be notified of important product support alerts like this.\n\n### References \n\n[Complete CVSS v3 Guide](<http://www.first.org/cvss/user-guide> \"Link resides outside of ibm.com\" ) \n[On-line Calculator v3](<http://www.first.org/cvss/calculator/3.0> \"Link resides outside of ibm.com\" )\n\nOff \n\n## Related Information\n\n[IBM Secure Engineering Web Portal](<http://www.ibm.com/security/secure-engineering/bulletins.html>) \n[IBM Product Security Incident Response Blog](<http://www.ibm.com/blogs/psirt>)\n\n## Change History\n\nDec 13, 2018: Original version published \nDec 19, 2018: Second version published \nFeb 7, 2019: Third Version Published\n\n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.\n\n## Disclaimer\n\nAccording to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"\"AS IS\"\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. \"Affected Products and Versions\" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.\n\n## Internal Use Only\n\n120981\n\n[{\"Business Unit\":{\"code\":\"BU059\",\"label\":\"IBM Software w\\/o TPS\"},\"Product\":{\"code\":\"SSMPHH\",\"label\":\"IBM Security Guardium\"},\"Component\":\"--\",\"Platform\":[{\"code\":\"PF016\",\"label\":\"Linux\"}],\"Version\":\"9-9.5\\n10-10.5\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB24\",\"label\":\"Security Software\"}}]", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.6, "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 4.0}, "published": "2019-02-07T19:55:01", "type": "ibm", "title": "Security Bulletin: IBM Security Guardium is affected by a Foreshadow Spectre Variant vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646"], "modified": "2019-02-07T19:55:01", "id": "78BAD43C88F0291540D28D9B278D560FB7D643B21400003DDCF10124DD2DED21", "href": "https://www.ibm.com/support/pages/node/744513", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2022-06-28T22:15:41", "description": "## Summary\n\nOpen Source Linux Kernel is used by IBM Netezza Host Management. IBM Netezza Host Management has addressed the applicable CVEs.\n\n## Vulnerability Details\n\n**CVEID: **[CVE-2018-3646](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646>) \n**DESCRIPTION: **Multiple Intel CPUs could allow a local attacker to obtain sensitive information, caused by a flaw in the CPU speculative branch instruction execution feature. By conducting targeted cache side-channel attacks and via a terminal page fault, an attacker with guest OS privilege could exploit this vulnerability to leak information residing in the L1 data cache and read data belonging to different security contexts. \nCVSS Base Score: 7.1 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148319> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) \n \n**CVEID: **[CVE-2018-3620](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620>) \n**DESCRIPTION: **Multiple Intel CPUs could allow a local attacker to obtain sensitive information, caused by a flaw in the CPU speculative branch instruction execution feature. By conducting targeted cache side-channel attacks and via a terminal page fault, an attacker could exploit this vulnerability to leak information residing in the L1 data cache and read data belonging to different security contexts. Note: This vulnerability is also known as the \"L1 Terminal Fault (L1TF)\" or \"Foreshadow\" attack. \nCVSS Base Score: 7.1 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148318> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\n## Affected Products and Versions\n\nIBM Netezza Host Management 5.4.9 - 5.4.21\n\n## Remediation/Fixes\n\nTo resolve the reported CVEs for Red Hat Enterprise Linux (RHEL) on following platforms :\n\nPureData System for Analytics N3001 \nPureData System for Analytics N200x \nPureData System for Analytics N1001 \nIBM Netezza High Capacity Appliance C1000 \nIBM Netezza 1000 \nIBM Netezza 100 \n \nUpdate to the following IBM Netezza Host Management release :\n\nProduct | VRMF | Remediation / First Fix \n---|---|--- \nIBM Netezza Host Management | 5.4.22 | [_Link to Fix Central_](<https://www.ibm.com/support/fixcentral/swg/selectFixes?product=ibm%2FInformation+Management%2FNetezza+Platform&release=HOSTMGMT_5&platform=All&function=fixId&fixids=5.4.22.0-IM-Netezza-HOSTMGMT-fp122578>) \n \n \nThe Netezza Host Management software contains the latest RHEL updates for the operating systems certified for use on IBM Netezza/PureData System for Analytics appliances. IBM recommends upgrading to the latest Netezza Host Management version to ensure that your hosts have the latest fixes, security changes, and operating system updates. IBM Support can assist you with planning for the Netezza Host Management and operating system upgrades to your appliances. \n \nFor more details on IBM Netezza Host Management security patching:\n\n * [_Red Hat Enterprise Linux (RHEL) Security Patching for IBM PureData System for Analytics appliances_](<http://www-01.ibm.com/support/docview.wss?uid=swg21615012>)\n\n## Get Notified about Future Security Bulletins\n\nSubscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html>) to be notified of important product support alerts like this.\n\n### References \n\n[Complete CVSS v3 Guide](<http://www.first.org/cvss/user-guide> \"Link resides outside of ibm.com\" ) \n[On-line Calculator v3](<http://www.first.org/cvss/calculator/3.0> \"Link resides outside of ibm.com\" )\n\nOff \n\n## Related Information\n\n[IBM Secure Engineering Web Portal](<http://www.ibm.com/security/secure-engineering/bulletins.html>) \n[IBM Product Security Incident Response Blog](<http://www.ibm.com/blogs/psirt>)\n\n## Change History\n\n2 November 2018: Original version published\n\n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.\n\n## Disclaimer\n\nAccording to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"\"AS IS\"\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. \"Affected Products and Versions\" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.\n\n[{\"Business Unit\":{\"code\":\"BU053\",\"label\":\"Cloud & Data Platform\"},\"Product\":{\"code\":\"SSULQD\",\"label\":\"IBM PureData System\"},\"Component\":\"\",\"Platform\":[{\"code\":\"PF025\",\"label\":\"Platform Independent\"}],\"Version\":\"All Versions\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB10\",\"label\":\"Data and AI\"}}]", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.6, "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 4.0}, "published": "2019-10-18T03:36:34", "type": "ibm", "title": "Security Bulletin: L1TF - L1 Terminal Fault Attack affect IBM Netezza Host Management", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620", "CVE-2018-3646"], "modified": "2019-10-18T03:36:34", "id": "F14A52FB736037E01486249E61D237CDD65B31B91BE931E3C7DE0760AAFD7ED4", "href": "https://www.ibm.com/support/pages/node/729723", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2022-06-28T22:14:17", "description": "## Summary\n\nPowerKVM is affected by vulnerabilities in the Linux kernel. IBM has now addressed these vulnerabilities. Note that, although the CVE descriptions do not reference POWER, POWER CPUs are afftected.\n\n## Vulnerability Details\n\n**CVEID:** [CVE-2018-3620](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620>) \n**DESCRIPTION:** Multiple Intel CPU''s could allow a local attacker to obtain sensitive information, caused by a flaw in the CPU speculative branch instruction execution feature. By conducting targeted cache side-channel attacks and via a terminal page fault, an attacker could exploit this vulnerability to leak information residing in the L1 data cache and read data belonging to different security contexts. Note: This vulnerability is also known as the \"L1 Terminal Fault (L1TF)\" or \"Foreshadow\" attack. \nCVSS Base Score: 7.1 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148318> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\n## Affected Products and Versions\n\nPowerKVM 3.1\n\n## Remediation/Fixes\n\nCustomers can update PowerKVM systems by using \"yum update\". \n\nFix images are made available via Fix Central. See <https://ibm.biz/BdHggw>. This issue is addressed starting with v3.1.0.2 update 12.\n\n**Refer to the following reference URLs for remediation and additional vulnerability details:** \nSource Bulletin: _<http://www.ibm.com/support/docview.wss?uid=isg3T1026853>_\n\n## Workarounds and Mitigations\n\nnone\n\n## Get Notified about Future Security Bulletins\n\nSubscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html>) to be notified of important product support alerts like this.\n\n### References \n\n[Complete CVSS v3 Guide](<http://www.first.org/cvss/user-guide> \"Link resides outside of ibm.com\" ) \n[On-line Calculator v3](<http://www.first.org/cvss/calculator/3.0> \"Link resides outside of ibm.com\" )\n\nOff \n\n## Related Information\n\n[IBM Secure Engineering Web Portal](<http://www.ibm.com/security/secure-engineering/bulletins.html>) \n[IBM Product Security Incident Response Blog](<http://www.ibm.com/blogs/psirt>)\n\n## Change History\n\n10 July 2018 - Initial Version\n\n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.\n\n## Disclaimer\n\nAccording to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"\"AS IS\"\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. \"Affected Products and Versions\" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.\n\n[{\"Business Unit\":{\"code\":\"BU054\",\"label\":\"Systems w\\/TPS\"},\"Product\":{\"code\":\"SSZJY4\",\"label\":\"PowerKVM\"},\"Component\":\"\",\"Platform\":[{\"code\":\"PF016\",\"label\":\"Linux\"}],\"Version\":\"3.1\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB08\",\"label\":\"Cognitive Systems\"}}]", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.6, "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 4.0}, "published": "2018-09-26T21:15:02", "type": "ibm", "title": "Security Bulletin: PowerKVM has released fixes in response to the vulnerabilities known as Foreshadow", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620"], "modified": "2018-09-26T21:15:02", "id": "B9B157CE2F5856DDEBF84E234FD678B9A23FE2E3E41F20E5870E92B79E07079A", "href": "https://www.ibm.com/support/pages/node/733108", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2022-06-28T22:07:06", "description": "## Summary\n\nIBM QRadar Network Security has addressed the following CPU vulnerability.\n\n## Vulnerability Details\n\n**CVEID: **[CVE-2018-3620](<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3620>) \n**DESCRIPTION: ** Multiple Intel CPU's could allow a local attacker to obtain sensitive information, caused by a flaw in the CPU speculative branch instruction execution feature. By conducting targeted cache side-channel attacks and via a terminal page fault, an attacker could exploit this vulnerability to leak information residing in the L1 data cache and read data belonging to different security contexts. Note: This vulnerability is also known as the \"L1 Terminal Fault (L1TF)\" or \"Foreshadow\" attack. \nCVSS Base Score: 7.1 \nCVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/148318> for the current score \nCVSS Environmental Score*: Undefined \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)\n\n## Affected Products and Versions\n\nIBM QRadar Network Security 5.4.0\n\nIBM QRadar Network Security 5.5.0\n\n## Remediation/Fixes\n\n_Product_ | _VRMF_ | _Remediation/First Fix_ \n---|---|--- \nIBM QRadar Network Security | 5.4.0 | Install Firmware 5.4.0.6 from the Available Updates page of the Local Management Interface, or by performing a One Time Scheduled Installation from SiteProtector. \nOr \nDownload Firmware 5.4.0.6 from [IBM Security License Key and Download Center](<https://ibmss.flexnetoperations.com/control/isdl/home>) and upload and install via the Available Updates page of the Local Management Interface. \nIBM QRadar Network Security | 5.5.0 | Install Firmware 5.5.0.1 from the Available Updates page of the Local Management Interface, or by performing a One Time Scheduled Installation from SiteProtector. \nOr \nDownload Firmware 5.5.0.1 from [IBM Security License Key and Download Center](<https://ibmss.flexnetoperations.com/control/isdl/home>) and upload and install via the Available Updates page of the Local Management Interface. \n \n## Workarounds and Mitigations\n\nNone\n\n## Get Notified about Future Security Bulletins\n\nSubscribe to [My Notifications](< http://www-01.ibm.com/software/support/einfo.html>) to be notified of important product support alerts like this.\n\n### References \n\n[Complete CVSS v3 Guide](<http://www.first.org/cvss/user-guide> \"Link resides outside of ibm.com\" ) \n[On-line Calculator v3](<http://www.first.org/cvss/calculator/3.0> \"Link resides outside of ibm.com\" )\n\nOff \n\n## Related Information\n\n[IBM Secure Engineering Web Portal](<http://www.ibm.com/security/secure-engineering/bulletins.html>) \n[IBM Product Security Incident Response Blog](<http://www.ibm.com/blogs/psirt>)\n\n## Change History\n\n7 December 2018: Original version published\n\n*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.\n\n## Disclaimer\n\nAccording to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an \"industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.\" IBM PROVIDES THE CVSS SCORES \"\"AS IS\"\" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY. In addition to other efforts to address potential vulnerabilities, IBM periodically updates the record of components contained in our product offerings. As part of that effort, if IBM identifies previously unidentified packages in a product/service inventory, we address relevant vulnerabilities regardless of CVE date. Inclusion of an older CVEID does not demonstrate that the referenced product has been used by IBM since that date, nor that IBM was aware of a vulnerability as of that date. We are making clients aware of relevant vulnerabilities as we become aware of them. \"Affected Products and Versions\" referenced in IBM Security Bulletins are intended to be only products and versions that are supported by IBM and have not passed their end-of-support or warranty date. Thus, failure to reference unsupported or extended-support products and versions in this Security Bulletin does not constitute a determination by IBM that they are unaffected by the vulnerability. Reference to one or more unsupported versions in this Security Bulletin shall not create an obligation for IBM to provide fixes for any unsupported or extended-support products or versions.\n\n## Internal Use Only\n\nAdvisory ID: 13284\n\nProduct Record ID: 121383\n\n[{\"Business Unit\":{\"code\":\"BU059\",\"label\":\"IBM Software w\\/o TPS\"},\"Product\":{\"code\":\"SSFSVP\",\"label\":\"IBM QRadar Network Security\"},\"Component\":\"\",\"Platform\":[{\"code\":\"PF009\",\"label\":\"Firmware\"}],\"Version\":\"5.4.0, 5.5.0\",\"Edition\":\"\",\"Line of Business\":{\"code\":\"LOB24\",\"label\":\"Security Software\"}}]", "cvss3": {"exploitabilityScore": 1.1, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "HIGH", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.6, "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0", "userInteraction": "NONE"}, "impactScore": 4.0}, "published": "2018-12-07T02:45:02", "type": "ibm", "title": "Security Bulletin: IBM QRadar Network Security is affected by a CPU vulnerability (CVE-2018-3620)", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.7, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3620"], "modified": "2018-12-07T02:45:02", "id": "BD55A0B2740E1F2CAF9976B32464B25B68B478CF5B269F51D2CBB1CBE5533C11", "href": "https://www.ibm.com/support/pages/node/732880", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}], "openvas": [{"lastseen": "2020-01-29T20:09:20", "description": "Multiple researchers have discovered a vulnerability in the way the\nIntel processor designs have implemented speculative execution of\ninstructions in combination with handling of page-faults. This flaw\ncould allow an attacker controlling an unprivileged process to read\nmemory from arbitrary (non-user controlled) addresses, including from\nthe kernel and all other processes running on the system or cross\nguest/host boundaries to read host memory.\n\nTo fully resolve these vulnerabilities it is also necessary to install\nupdated CPU microcode (only available in Debian non-free). Common server\nclass CPUs are covered in the update released as DLA 1446-1.", "cvss3": {}, "published": "2018-09-03T00:00:00", "type": "openvas", "title": "Debian LTS: Security Advisory for linux-4.9 (DLA-1481-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-3620"], "modified": "2020-01-29T00:00:00", "id": "OPENVAS:1361412562310891481", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891481", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891481\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2018-3620\", \"CVE-2018-3646\");\n script_name(\"Debian LTS: Security Advisory for linux-4.9 (DLA-1481-1)\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-09-03 00:00:00 +0200 (Mon, 03 Sep 2018)\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_tag(name:\"affected\", value:\"linux-4.9 on Debian Linux\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n4.9.110-3+deb9u4~deb8u1.\n\nWe recommend that you upgrade your linux-4.9 packages.\");\n\n script_tag(name:\"summary\", value:\"Multiple researchers have discovered a vulnerability in the way the\nIntel processor designs have implemented speculative execution of\ninstructions in combination with handling of page-faults. This flaw\ncould allow an attacker controlling an unprivileged process to read\nmemory from arbitrary (non-user controlled) addresses, including from\nthe kernel and all other processes running on the system or cross\nguest/host boundaries to read host memory.\n\nTo fully resolve these vulnerabilities it is also necessary to install\nupdated CPU microcode (only available in Debian non-free). Common server\nclass CPUs are covered in the update released as DLA 1446-1.\");\n\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-4.9-arm\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.9\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-686\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-686-pae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-all\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-all-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-all-armel\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-all-armhf\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-all-i386\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-armmp\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-armmp-lpae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-common\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-common-rt\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-marvell\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-rt-686-pae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.7-rt-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-686\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-686-pae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-all\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-all-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-all-armel\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-all-armhf\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-all-i386\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-armmp\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-armmp-lpae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-common\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-common-rt\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-marvell\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-rt-686-pae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-0.bpo.8-rt-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-686\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-686-pae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-686-pae-dbg\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-amd64-dbg\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-armmp\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-armmp-lpae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-marvell\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-rt-686-pae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-rt-686-pae-dbg\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-rt-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.7-rt-amd64-dbg\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-686\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-686-pae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-686-pae-dbg\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-amd64-dbg\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-armmp\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-armmp-lpae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-marvell\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-rt-686-pae\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-rt-686-pae-dbg\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-rt-amd64\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-0.bpo.8-rt-amd64-dbg\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.9\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-manual-4.9\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.9\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.9\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-0.bpo.7\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-0.bpo.8\", ver:\"4.9.110-3+deb9u4~deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-07-04T18:55:24", "description": "This update provides mitigations for the L1 Terminal Fault\n\nvulnerability affecting a range of Intel CPUs.\n\nFor additional information please\nThe microcode updates\nmentioned there are not yet available in a form distributable by Debian.\n\nIn addition two denial of service vulnerabilities have been fixed\n(XSA-268 and XSA-269).", "cvss3": {}, "published": "2018-08-16T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 4274-1 (xen - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-3620"], "modified": "2019-07-04T00:00:00", "id": "OPENVAS:1361412562310704274", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704274", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4274-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704274\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2018-3620\", \"CVE-2018-3646\");\n script_name(\"Debian Security Advisory DSA 4274-1 (xen - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-08-16 00:00:00 +0200 (Thu, 16 Aug 2018)\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2018/dsa-4274.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"xen on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (stretch), these problems have been fixed in\nversion 4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10.\n\nWe recommend that you upgrade your xen packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/xen\");\n script_tag(name:\"summary\", value:\"This update provides mitigations for the L1 Terminal Fault\n\nvulnerability affecting a range of Intel CPUs.\n\nFor additional information please\nThe microcode updates\nmentioned there are not yet available in a form distributable by Debian.\n\nIn addition two denial of service vulnerabilities have been fixed\n(XSA-268 and XSA-269).\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n script_xref(name:\"URL\", value:\"https://xenbits.xen.org/xsa/advisory-273.html\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libxen-4.8\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libxen-dev\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libxenstore3.0\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-hypervisor-4.8-amd64\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-hypervisor-4.8-arm64\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-hypervisor-4.8-armhf\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-system-amd64\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-system-arm64\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-system-armhf\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-utils-4.8\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xen-utils-common\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"xenstore-utils\", ver:\"4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:11", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-08-19T00:00:00", "type": "openvas", "title": "Fedora Update for kernel-headers FEDORA-2018-1c80fea1cd", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-3620"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310874963", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874963", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_1c80fea1cd_kernel-headers_fc27.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for kernel-headers FEDORA-2018-1c80fea1cd\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874963\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-19 06:42:32 +0200 (Sun, 19 Aug 2018)\");\n script_cve_id(\"CVE-2018-3646\", \"CVE-2018-3620\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for kernel-headers FEDORA-2018-1c80fea1cd\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel-headers'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"kernel-headers on Fedora 27\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-1c80fea1cd\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WTSW2PFYIWRQEN6TZT6DXAM5BQTELQBL\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC27\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC27\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.17.14~3.fc27\", rls:\"FC27\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-01-27T18:39:19", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1323)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-3620"], "modified": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220181323", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220181323", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2018.1323\");\n script_version(\"2020-01-23T11:21:43+0000\");\n script_cve_id(\"CVE-2018-3620\", \"CVE-2018-3646\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:21:43 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:21:43 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1323)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-2\\.5\\.1\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2018-1323\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1323\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2018-1323 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization 2.5.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-2.5.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~514.44.5.10_76\", rls:\"EULEROSVIRT-2.5.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~514.44.5.10_76\", rls:\"EULEROSVIRT-2.5.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~514.44.5.10_76\", rls:\"EULEROSVIRT-2.5.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~514.44.5.10_76\", rls:\"EULEROSVIRT-2.5.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~514.44.5.10_76\", rls:\"EULEROSVIRT-2.5.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~514.44.5.10_76\", rls:\"EULEROSVIRT-2.5.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:32:55", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-08-19T00:00:00", "type": "openvas", "title": "Fedora Update for kernel-headers FEDORA-2018-f8cba144ae", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-3620"], "modified": "2019-03-15T00:00:00", "id": "OPENVAS:1361412562310874959", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874959", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_f8cba144ae_kernel-headers_fc28.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for kernel-headers FEDORA-2018-f8cba144ae\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874959\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-19 06:42:11 +0200 (Sun, 19 Aug 2018)\");\n script_cve_id(\"CVE-2018-3646\", \"CVE-2018-3620\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for kernel-headers FEDORA-2018-f8cba144ae\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel-headers'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"affected\", value:\"kernel-headers on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-f8cba144ae\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST3354PD2XE3UFWSHCT5P5KAYXS5ZGTX\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~4.17.14~3.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-07-04T18:55:57", "description": "Multiple researchers have discovered a vulnerability in the way the\nIntel processor designs have implemented speculative execution of\ninstructions in combination with handling of page-faults. This flaw\ncould allow an attacker controlling an unprivileged process to read\nmemory from arbitrary (non-user controlled) addresses, including from\nthe kernel and all other processes running on the system or cross\nguest/host boundaries to read host memory.\n\nTo fully resolve these vulnerabilities it is also necessary to install\nupdated CPU microcode (only available in Debian non-free). Common server\nclass CPUs are covered in the update released as DSA 4273-1.", "cvss3": {}, "published": "2018-08-20T00:00:00", "type": "openvas", "title": "Debian Security Advisory DSA 4279-1 (linux - security update)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-3620"], "modified": "2019-07-04T00:00:00", "id": "OPENVAS:1361412562310704279", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704279", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Auto-generated from advisory DSA 4279-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License as published by\n# the Free Software Foundation; either version 2 of the License, or\n# (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704279\");\n script_version(\"2019-07-04T09:25:28+0000\");\n script_cve_id(\"CVE-2018-3620\", \"CVE-2018-3646\");\n script_name(\"Debian Security Advisory DSA 4279-1 (linux - security update)\");\n script_tag(name:\"last_modification\", value:\"2019-07-04 09:25:28 +0000 (Thu, 04 Jul 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-08-20 00:00:00 +0200 (Mon, 20 Aug 2018)\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2018/dsa-4279.html\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2018 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n script_tag(name:\"affected\", value:\"linux on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (stretch), these problems have been fixed in\nversion 4.9.110-3+deb9u3.\n\nWe recommend that you upgrade your linux packages.\");\n\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/linux\");\n script_tag(name:\"summary\", value:\"Multiple researchers have discovered a vulnerability in the way the\nIntel processor designs have implemented speculative execution of\ninstructions in combination with handling of page-faults. This flaw\ncould allow an attacker controlling an unprivileged process to read\nmemory from arbitrary (non-user controlled) addresses, including from\nthe kernel and all other processes running on the system or cross\nguest/host boundaries to read host memory.\n\nTo fully resolve these vulnerabilities it is also necessary to install\nupdated CPU microcode (only available in Debian non-free). Common server\nclass CPUs are covered in the update released as DSA 4273-1.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software version using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"hyperv-daemons\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower-dev\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower1\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libusbip-dev\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-arm\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-s390\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-x86\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-cpupower\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.9\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-armel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-armhf\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-i386\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-mips\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-mips64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-mipsel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-ppc64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-all-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-common\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-common-rt\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-3-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-armel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-armhf\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-i386\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-mips\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-mips64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-mipsel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-ppc64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-all-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-common\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-common-rt\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-4-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-armel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-armhf\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-i386\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-mips\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-mips64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-mipsel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-ppc64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-all-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-common\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-common-rt\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-5-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-armel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-armhf\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-i386\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-mips\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-mips64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-mipsel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-ppc64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-all-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-6-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-armel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-armhf\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-i386\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-mips\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-mips64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-mipsel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-ppc64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-all-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-common\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-common-rt\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-7-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all-armel\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all-armhf\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all-i386\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all-mips\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all-ppc64el\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-all-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-common\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-common-rt\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-8-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-4kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-5kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-686-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-arm64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-armmp-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-armmp-lpae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-loongson-3-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-marvell-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-octeon-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-powerpc64le-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-rt-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-rt-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-3-s390x-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-4kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-5kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-686-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-arm64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-armmp-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-armmp-lpae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-loongson-3-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-marvell-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-octeon-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-powerpc64le-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-rt-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-rt-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-4-s390x-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-4kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-5kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-686-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-arm64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-armmp-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-armmp-lpae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-loongson-3-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-marvell-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-octeon-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-powerpc64le-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-rt-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-rt-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-5-s390x-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-4kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-5kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-686-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-arm64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-armmp-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-armmp-lpae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-loongson-3-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-marvell-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-octeon-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-powerpc64le-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-rt-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-rt-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-6-s390x-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-4kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-5kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-686-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-arm64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-armmp-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-armmp-lpae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-loongson-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-loongson-3-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-marvell-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-octeon-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-powerpc64le-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-rt-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-rt-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-7-s390x-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-4kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-4kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-5kc-malta\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-5kc-malta-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-686\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-686-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-arm64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-arm64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-armmp\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-armmp-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-armmp-lpae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-armmp-lpae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-marvell\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-marvell-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-octeon\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-octeon-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-powerpc64le\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-powerpc64le-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-rt-686-pae\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-rt-686-pae-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-rt-amd64\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-rt-amd64-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-s390x\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-8-s390x-dbg\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.9\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-manual-4.9\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.9\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.9\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-3\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-4\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-5\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-7\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-8\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"usbip\", ver:\"4.9.110-3+deb9u3\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:24", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-08-15T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux-azure USN-3740-2", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-5391", "CVE-2018-3620"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310843612", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843612", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3740_2.nasl 14288 2019-03-18 16:34:17Z cfischer $\n#\n# Ubuntu Update for linux-azure USN-3740-2\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843612\");\n script_version(\"$Revision: 14288 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 17:34:17 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-15 06:19:24 +0200 (Wed, 15 Aug 2018)\");\n script_cve_id(\"CVE-2018-3646\", \"CVE-2018-3620\", \"CVE-2018-5391\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux-azure USN-3740-2\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-azure'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n script_tag(name:\"insight\", value:\"USN-3740-1 fixed vulnerabilities in the Linux\n kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for\n the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu\n16.04 LTS.\n\nIt was discovered that memory present in the L1 data cache of an Intel CPU\ncore may be exposed to a malicious process that is executing on the CPU\ncore. This vulnerability is also known as L1 Terminal Fault (L1TF). A local\nattacker in a guest virtual machine could use this to expose sensitive\ninformation (memory from other guests or the host OS). (CVE-2018-3646)\n\nIt was discovered that memory present in the L1 data cache of an Intel CPU\ncore may be exposed to a malicious process that is executing on the CPU\ncore. This vulnerability is also known as L1 Terminal Fault (L1TF). A local\nattacker could use this to expose sensitive information (memory from the\nkernel or other processes). (CVE-2018-3620)\n\nJuha-Matti Tilli discovered that the IP implementation in the Linux kernel\nperformed algorithmically expensive operations in some situations when\nhandling incoming packet fragments. A remote attacker could use this to\ncause a denial of service. (CVE-2018-5391)\");\n script_tag(name:\"affected\", value:\"linux-azure on Ubuntu 16.04 LTS\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"USN\", value:\"3740-2\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3740-2/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-1017-gcp\", ver:\"4.15.0-1017.18~16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-1021-azure\", ver:\"4.15.0-1021.21~16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-32-generic\", ver:\"4.15.0-32.35~16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-32-generic-lpae\", ver:\"4.15.0-32.35~16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-32-lowlatency\", ver:\"4.15.0-32.35~16.04.1\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.15.0.1021.27\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1017.29\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic-hwe-16.04\", ver:\"4.15.0.32.54\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-16.04\", ver:\"4.15.0.32.54\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1017.29\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-16.04\", ver:\"4.15.0.32.54\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-16.04\", ver:\"4.15.0.32.54\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-06-19T17:52:44", "description": "Intel and security researchers publicly disclosed three new cpu side-channel vulnerabilities (CVE-2018-3615, CVE-2018-3620 and CVE-2018-3646).", "cvss3": {}, "published": "2020-05-26T00:00:00", "type": "openvas", "title": "Huawei Data Communication: CPU Side Channel Vulnerability L1TF (huawei-sa-20180815-01-cpu)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-3620", "CVE-2018-3615"], "modified": "2020-06-17T00:00:00", "id": "OPENVAS:1361412562310107834", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310107834", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.107834\");\n script_version(\"2020-06-17T13:37:18+0000\");\n script_tag(name:\"last_modification\", value:\"2020-06-17 13:37:18 +0000 (Wed, 17 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-05-26 15:22:01 +0200 (Tue, 26 May 2020)\");\n script_tag(name:\"cvss_base\", value:\"5.4\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:P/A:N\");\n\n script_cve_id(\"CVE-2018-3615\", \"CVE-2018-3620\", \"CVE-2018-3646\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_name(\"Huawei Data Communication: CPU Side Channel Vulnerability L1TF (huawei-sa-20180815-01-cpu)\");\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei\");\n script_dependencies(\"gb_huawei_vrp_network_device_consolidation.nasl\");\n script_mandatory_keys(\"huawei/vrp/detected\");\n\n script_tag(name:\"summary\", value:\"Intel and security researchers publicly disclosed three new cpu side-channel vulnerabilities (CVE-2018-3615, CVE-2018-3620 and CVE-2018-3646).\");\n\n script_tag(name:\"insight\", value:\"Intel and security researchers publicly disclosed three new cpu side-channel vulnerabilities (CVE-2018-3615, CVE-2018-3620 and CVE-2018-3646). Successful exploit of these vulnerabilities could allow a local attacker to read the memory of other processes in specific situations. These vulnerabilities are named by researchers as 'Foreshadow' and 'Foreshadow-NG'. They are also known as L1 Terminal Fault (L1TF) in the industry. (Vulnerability ID: HWPSIRT-2018-08118, HWPSIRT-2018-08119 and HWPSIRT-2018-08120)Huawei has released software updates to fix these vulnerabilities. This advisory is available in the linked references.\");\n\n script_tag(name:\"impact\", value:\"Local attackers may exploit these vulnerabilities to cause information leak on the affected system.\");\n\n script_tag(name:\"affected\", value:\"1288H V5 versions Versions earlier than V100R005C00SPC117 (BIOS V081)\n\n2288H V5 versions Versions earlier than V100R005C00SPC117 (BIOS V081)\n\n2488 V5 versions Versions earlier than V100R005C00SPC500 (BIOS V095)\n\n2488H V5 versions Versions earlier than V100R005C00SPC203 (BIOS V095)\n\n5288 V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\n5288 V5 versions Versions earlier than V100R005C00SPC101 (BIOS V081)\n\nBH622 V2 versions V100R002C00 Versions earlier than V100R002C00SPC308 (BIOS V519)\n\nBH640 V2 versions Versions earlier than V100R002C00SPC306 (BIOS V519)\n\nCH121 versions V100R001C00SPC305\n\nCH121 V3 versions Versions earlier than V100R001C00SPC261 (BIOS V399)\n\nCH121 V5 versions Versions earlier than V100R001C00SPC131 (BIOS V081)\n\nCH121H V3 versions Versions earlier than V100R001C00SPC121 (BIOS V399)\n\nCH121L V3 versions Versions earlier than V100R001C00SPC161 (BIOS V399)\n\nCH121L V5 versions Versions earlier than V100R001C00SPC131 (BIOS V081)\n\nCH140 V3 versions Versions earlier than V100R001C00SPC181 (BIOS V399)\n\nCH140L V3 versions Versions earlier than V100R001C00SPC161 (BIOS V399)\n\nCH220 V3 versions Versions earlier than V100R001C00SPC261 (BIOS V399)\n\nCH222 V3 versions Versions earlier than V100R001C00SPC261 (BIOS V399)\n\nCH225 V3 versions Versions earlier than V100R001C00SPC161 (BIOS V399)\n\nCH226 V3 versions Versions earlier than V100R001C00SPC181 (BIOS V399)\n\nCH242 V3 versions Versions earlier than V100R001C00SPC331 (BIOS V358)\n\nCH242 V3 DDR4 versions Versions earlier than V100R001C00SPC331 (BIOS V817)\n\nCH242 V5 versions Versions earlier than V100R001C00SPC121 (BIOS V095)\n\nEulerOS versions V200R007C00\n\nFusionSphere OpenStack versions V100R006C00RC3B036 V100R006C10SPC112\n\nHUAWEI MateBook (HZ-W09/ HZ-W19/ HZ-W29) versions Versions earlier than BIOS 1.52\n\nHUAWEI MateBook B200/ MateBook D (PL-W09/ PL-W19/ PL-W29) versions Versions earlier than BIOS 1.21\n\nHUAWEI MateBook D (MRC-W10/ MRC-W50/ MRC-W60) versions Versions earlier than BIOS 1.19\n\nHUAWEI MateBook X Pro (MACH-W19/ MACH-W29) versions Versions earlier than BIOS 1.12\n\nHonor MagicBook (VLT-W50/ VLT-W60) versions Versions earlier than BIOS 1.12\n\nRH1288 V2 versions Versions earlier than V100R002C00SPC615 (BIOS V519)\n\nRH1288 V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\nRH1288A V2 versions Versions earlier than V100R002C00SPC708 (BIOS V519)\n\nRH2265 V2 versions Versions earlier than V100R002C00SPC510 (BIOS V519)\n\nRH2268 V2 versions Versions earlier than V100R002C00SPC609 (BIOS V519)\n\nRH2285 V2 versions Versions earlier than V100R002C00SPC510 (BIOS V519)\n\nRH2285H V2 versions Versions earlier than V100R002C00SPC510 (BIOS V519)\n\nRH2288 V2 versions V100R002C00 Versions earlier than V100R002C00SPC609 (BIOS V519)\n\nRH2288 V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\nRH2288A V2 versions Versions earlier than V100R002C00SPC708 (BIOS V519)\n\nRH2288E V2 versions Versions earlier than V100R002C00SPC302 (BIOS V519)\n\nRH2288H V2 versions Versions earlier than V100R002C00SPC619 (BIOS V519)\n\nRH2288H V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\nRH2485 V2 versions Versions earlier than V100R002C00SPC712 (BIOS V519)\n\nRH5885 V2 4S versions Versions earlier than V100R001C02SPC306 (BIOS V038)\n\nRH5885 V2 8S versions Versions earlier than V100R001C02SPC306 (BIOS V062)\n\nRH5885 V3 (E7V2) versions Versions earlier than V100R003C01SPC127 (BIOS V358)\n\nRH5885 V3 (E7V3&E7V4) versions Versions earlier than V100R003C10SPC121 (BIOS V817)\n\nRH5885H V3 (E7V2) versions Versions earlier than V100R003C00SPC218 (BIOS V358)\n\nRH5885H V3 (E7V3) versions Versions earlier than V100R003C00SPC218 (BIOS V660)\n\nRH5885H V3 (E7V4) versions Versions earlier than V100R003C10SPC120 (BIOS V817)\n\nRH8100 V3 (E7V2&E7V3) versions Versions earlier than V100R003C00SPC229 (BIOS V698)\n\nRH8100 V3 (E7V4) versions Versions earlier than V100R003C00SPC229 (BIOS V817)\n\nSMC2.0 versions V500R002C00\n\nUC Audio Recorder versions V100R001C01 V100R001C02\n\nVP9630 versions V600R006C10\n\nVP9660 versions V600R006C10\n\nXH310 V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\nXH321 V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\nXH321 V5 versions Versions earlier than V100R005C00SPC501 (BIOS V095)\n\nXH620 V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\nXH622 V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\nXH628 V3 versions Versions earlier than V100R003C00SPC706 (BIOS V399)\n\neSpace U2980 versions V100R001C01 V100R001C02 V100R001C10 V200R003C00\n\neSpace UMS versions V200R002C00\n\niManager NetEco versions V600R007C00 V600R007C10 V600R007C11 V600R007C12 V600R007C20 V600R007C30 V600R007C40 V600R007C50 V600R007C60 V600R008C00 V600R008C10 V600R008C20 V600R008C30\n\niManager NetEco 6000 versions V600R007C40 V600R007C60 V600R007C80 V600R007C90 V600R008C00\");\n\n script_tag(name:\"solution\", value:\"See the referenced vendor advisory for a solution.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_xref(name:\"URL\", value:\"https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en\");\n\n exit(0);\n}\n\ninclude( \"host_details.inc\" );\ninclude( \"version_func.inc\" );\n\ncpe_list = make_list( \"cpe:/o:huawei:_firmware\" ); #no known vulnerable devices\n\nif( ! infos = get_app_version_from_list( cpe_list:cpe_list, nofork:TRUE ) )\n exit( 0 );\n\ncpe = infos[\"cpe\"];\nversion = toupper( infos[\"version\"] );\n\npatch = get_kb_item( \"huawei/vrp/patch\" );\n\nif( cpe =~ \"^cpe:/o:huawei:_firmware\" ) {\n if( version == \"\" || version == \"\" || version == \"\" || version == \"\" ||\n version == \"\" ) {\n report = report_fixed_ver( installed_version:version, fixed_version:\"\" );\n security_message( port:0, data:report );\n exit( 0 );\n }\n}\n\nexit( 99 );\n", "cvss": {"score": 5.4, "vector": "AV:L/AC:M/Au:N/C:C/I:P/A:N"}}, {"lastseen": "2020-01-27T18:39:04", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1345)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-3620", "CVE-2018-5390"], "modified": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220181345", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220181345", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2018.1345\");\n script_version(\"2020-01-23T11:22:36+0000\");\n script_cve_id(\"CVE-2018-3620\", \"CVE-2018-3646\", \"CVE-2018-5390\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:22:36 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:22:36 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1345)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-2\\.5\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2018-1345\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1345\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2018-1345 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3646)\n\nA flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.(CVE-2018-5390)\n\nModern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.(CVE-2018-3620)\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS Virtualization 2.5.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-2.5.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~327.64.60.3_22\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~327.64.60.3_22\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~327.64.60.3_22\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~327.64.60.3_22\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~327.64.60.3_22\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~327.64.60.3_22\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:33:20", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-08-15T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-3740-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-5391", "CVE-2018-3620"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310843613", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843613", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3740_1.nasl 14288 2019-03-18 16:34:17Z cfischer $\n#\n# Ubuntu Update for linux USN-3740-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843613\");\n script_version(\"$Revision: 14288 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 17:34:17 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-15 06:19:31 +0200 (Wed, 15 Aug 2018)\");\n script_cve_id(\"CVE-2018-3646\", \"CVE-2018-3620\", \"CVE-2018-5391\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-3740-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\n on the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that memory present in the\n L1 data cache of an Intel CPU core may be exposed to a malicious process that\n is executing on the CPU core. This vulnerability is also known as L1 Terminal\n Fault (L1TF). A local attacker in a guest virtual machine could use this to\n expose sensitive information (memory from other guests or the host OS).\n (CVE-2018-3646)\n\nIt was discovered that memory present in the L1 data cache of an Intel CPU\ncore may be exposed to a malicious process that is executing on the CPU\ncore. This vulnerability is also known as L1 Terminal Fault (L1TF). A local\nattacker could use this to expose sensitive information (memory from the\nkernel or other processes). (CVE-2018-3620)\n\nJuha-Matti Tilli discovered that the IP implementation in the Linux kernel\nperformed algorithmically expensive operations in some situations when\nhandling incoming packet fragments. A remote attacker could use this to\ncause a denial of service. (CVE-2018-5391)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 18.04 LTS\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"USN\", value:\"3740-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3740-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU18.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-1015-oem\", ver:\"4.15.0.1015.17\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-1017-gcp\", ver:\"4.15.0-1017.18\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-1019-aws\", ver:\"4.15.0-1019.19\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-1019-kvm\", ver:\"4.15.0-1019.19\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-1020-raspi2\", ver:\"4.15.0-1020.22\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-1021-azure\", ver:\"4.15.0.1021.21\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-32-generic\", ver:\"4.15.0-32.35\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-32-generic-lpae\", ver:\"4.15.0-32.35\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-32-lowlatency\", ver:\"4.15.0-32.35\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.15.0-32-snapdragon\", ver:\"4.15.0-32.35\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.15.0.1019.19\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"4.15.0.1021.21\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-azure-edge\", ver:\"4.15.0.1021.21\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"4.15.0.1017.19\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.15.0.32.34\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.15.0.32.34\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"4.15.0.1017.19\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.15.0.1019.19\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.15.0.32.34\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"4.15.0.1015.17\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.15.0.1020.18\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.15.0.32.34\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:33:15", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-8360"], "description": "This host is missing an important security\n update according to Microsoft KB4344149", "modified": "2019-05-20T00:00:00", "published": "2018-08-15T00:00:00", "id": "OPENVAS:1361412562310813763", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813763", "type": "openvas", "title": "Microsoft .NET Framework Information Disclosure Vulnerability (KB4344149)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Information Disclosure Vulnerability (KB4344149)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813763\");\n script_version(\"2019-05-20T11:12:48+0000\");\n script_cve_id(\"CVE-2018-8360\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2019-05-20 11:12:48 +0000 (Mon, 20 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-08-15 10:51:10 +0530 (Wed, 15 Aug 2018)\");\n script_name(\"Microsoft .NET Framework Information Disclosure Vulnerability (KB4344149)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4344149\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists when .NET Framework is used\n in high-load/high-density network connections where content from one stream\n can blend into another stream.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to access information in multi-tenant environments.\");\n\n script_tag(name:\"affected\", value:\".NET Framework 4.5.2 for Windows 7 SP1,\n Server 2008 R2 SP1, and Server 2008 SP2\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4344149\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2008:3, win2008x64:3, win7:2, win7x64:2, win2008r2:2) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n dotPath = registry_get_sz(key:key + item, item:\"Path\");\n if(dotPath && \"\\Microsoft.NET\\Framework\" >< dotPath)\n {\n dllVer = fetch_file_version(sysPath:dotPath, file_name:\"system.dll\");\n if(!dllVer || dllVer !~ \"^4\\.\"){\n continue;\n }\n\n if(version_in_range(version:dllVer, test_version:\"4.0.30319.30000\", test_version2:\"4.0.30319.36459\"))\n {\n report = report_fixed_ver(file_checked:dotPath + \"\\system.dll\",\n file_version:dllVer, vulnerable_range: \"4.0.30319.30000 - 4.0.30319.36459\");\n security_message(data:report);\n exit(0);\n }\n }\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:13", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-8360"], "description": "This host is missing an important security\n update according to Microsoft KB4344152", "modified": "2019-05-20T00:00:00", "published": "2018-08-15T00:00:00", "id": "OPENVAS:1361412562310813766", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813766", "type": "openvas", "title": "Microsoft .NET Framework Information Disclosure Vulnerability (KB4344152)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Information Disclosure Vulnerability (KB4344152)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813766\");\n script_version(\"2019-05-20T11:12:48+0000\");\n script_cve_id(\"CVE-2018-8360\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2019-05-20 11:12:48 +0000 (Mon, 20 May 2019)\");\n script_tag(name:\"creation_date\", value:\"2018-08-15 11:25:10 +0530 (Wed, 15 Aug 2018)\");\n script_name(\"Microsoft .NET Framework Information Disclosure Vulnerability (KB4344152)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4344152\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists when .NET Framework is used\n in high-load/high-density network connections where content from one stream\n can blend into another stream.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to access information in multi-tenant environments.\");\n\n script_tag(name:\"affected\", value:\".NET Framework 3.5.1 for Windows 7 SP1 and\n Windows Server 2008 R2 SP1\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4344152\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nkey2 = \"SOFTWARE\\Microsoft\\.NETFramework\\AssemblyFolders\\\";\nforeach item (registry_enum_keys(key:key2))\n{\n path = registry_get_sz(key:key2 + item, item:\"All Assemblies In\");\n if(path)\n {\n dllVer = fetch_file_version(sysPath:path, file_name:\"system.identitymodel.dll\");\n if(!dllVer || dllVer !~ \"^3\\.\"){\n continue;\n }\n\n if(version_in_range(version:dllVer, test_version:\"3.0.4506.7082\", test_version2:\"3.0.4506.8799\"))\n {\n report = report_fixed_ver(file_checked:path + \"system.identitymodel.dll\",\n file_version:dllVer, vulnerable_range:\"3.0.4506.7082 - 3.0.4506.8799\");\n security_message(data:report);\n exit(0);\n }\n }\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-06-08T23:06:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-8360"], "description": "This host is missing an important security\n update according to Microsoft KB4344146", "modified": "2020-06-04T00:00:00", "published": "2018-08-15T00:00:00", "id": "OPENVAS:1361412562310813760", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310813760", "type": "openvas", "title": "Microsoft .NET Framework Information Disclosure Vulnerability (KB4344146)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft .NET Framework Information Disclosure Vulnerability (KB4344146)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.813760\");\n script_version(\"2020-06-04T11:13:22+0000\");\n script_cve_id(\"CVE-2018-8360\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-04 11:13:22 +0000 (Thu, 04 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-08-15 09:31:10 +0530 (Wed, 15 Aug 2018)\");\n script_name(\"Microsoft .NET Framework Information Disclosure Vulnerability (KB4344146)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft KB4344146\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw exists when .NET Framework is used\n in high-load/high-density network connections where content from one stream\n can blend into another stream.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow an attacker\n to access information in multi-tenant environments.\");\n\n script_tag(name:\"affected\", value:\"Microsoft .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, and 4.7.2 for Microsoft Windows 7 SP1 and Microsoft Windows Server 2008 R2 SP1 and for .NET Framework 4.6 for Microsoft Windows Server 2008 SP2.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/help/4344146\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2008:3, win2008x64:3, win7:2, win7x64:2, win2008r2:2) <= 0){\n exit(0);\n}\n\nkey = \"SOFTWARE\\Microsoft\\ASP.NET\\\";\nif(!registry_key_exists(key:key)){\n exit(0);\n}\n\nforeach item (registry_enum_keys(key:key))\n{\n dotPath = registry_get_sz(key:key + item, item:\"Path\");\n if(dotPath && \"\\Microsoft.NET\\Framework\" >< dotPath)\n {\n dllVer = fetch_file_version(sysPath:dotPath, file_name:\"mscorlib.dll\");\n if(!dllVer || dllVer !~ \"^4\\.[67]\\.\"){\n continue;\n }\n\n if(version_is_less(version:dllVer, test_version:\"4.7.3133.0\"))\n {\n report = report_fixed_ver(file_checked:dotPath + \"mscorlib.dll\",\n file_version:dllVer, vulnerable_range:\"4.6 - 4.7.3132\");\n security_message(data:report);\n exit(0);\n }\n }\n}\nexit(99);\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:20", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2018-08-15T00:00:00", "type": "openvas", "title": "Ubuntu Update for linux USN-3741-1", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-5391", "CVE-2018-3620", "CVE-2018-5390"], "modified": "2019-03-18T00:00:00", "id": "OPENVAS:1361412562310843617", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843617", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3741_1.nasl 14288 2019-03-18 16:34:17Z cfischer $\n#\n# Ubuntu Update for linux USN-3741-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843617\");\n script_version(\"$Revision: 14288 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 17:34:17 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-08-15 06:20:12 +0200 (Wed, 15 Aug 2018)\");\n script_cve_id(\"CVE-2018-3646\", \"CVE-2018-3620\", \"CVE-2018-5390\", \"CVE-2018-5391\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for linux USN-3741-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present\non the target host.\");\n script_tag(name:\"insight\", value:\"It was discovered that memory present in the\nL1 data cache of an Intel CPU core may be exposed to a malicious process that is\nexecuting on the CPU core. This vulnerability is also known as L1 Terminal Fault\n(L1TF). A local attacker in a guest virtual machine could use this to expose\nsensitive information (memory from other guests or the host OS). (CVE-2018-3646)\n\nIt was discovered that memory present in the L1 data cache of an Intel CPU\ncore may be exposed to a malicious process that is executing on the CPU\ncore. This vulnerability is also known as L1 Terminal Fault (L1TF). A local\nattacker could use this to expose sensitive information (memory from the\nkernel or other processes). (CVE-2018-3620)\n\nJuha-Matti Tilli discovered that the TCP implementation in the Linux kernel\nperformed algorithmically expensive operations in some situations when\nhandling incoming packets. A remote attacker could use this to cause a\ndenial of service. (CVE-2018-5390)\n\nJuha-Matti Tilli discovered that the IP implementation in the Linux kernel\nperformed algorithmically expensive operations in some situations when\nhandling incoming packet fragments. A remote attacker could use this to\ncause a denial of service. (CVE-2018-5391)\");\n script_tag(name:\"affected\", value:\"linux on Ubuntu 16.04 LTS\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"USN\", value:\"3741-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3741-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-1031-kvm\", ver:\"4.4.0-1031.37\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-1065-aws\", ver:\"4.4.0-1065.75\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-1094-raspi2\", ver:\"4.4.0-1094.102\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-1098-snapdragon\", ver:\"4.4.0-1098.103\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-133-generic\", ver:\"4.4.0-133.159\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-133-generic-lpae\", ver:\"4.4.0-133.159\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-133-lowlatency\", ver:\"4.4.0-133.159\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-133-powerpc-e500mc\", ver:\"4.4.0-133.159\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-133-powerpc-smp\", ver:\"4.4.0-133.159\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-133-powerpc64-emb\", ver:\"4.4.0-133.159\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-4.4.0-133-powerpc64-smp\", ver:\"4.4.0-133.159\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1065.67\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.4.0.133.139\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.4.0.133.139\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.4.0.1031.30\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.4.0.133.139\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.4.0.133.139\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.4.0.133.139\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.4.0.133.139\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.4.0.133.139\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.4.0.1094.94\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.4.0.1098.90\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-01-27T18:37:17", "description": "The remote host is missing an update for the Huawei EulerOS\n ", "cvss3": {}, "published": "2020-01-23T00:00:00", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1279)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-3646", "CVE-2018-5391", "CVE-2018-3620", "CVE-2018-5390"], "modified": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220181279", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220181279", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2018.1279\");\n script_version(\"2020-01-23T11:20:00+0000\");\n script_cve_id(\"CVE-2018-3620\", \"CVE-2018-3646\", \"CVE-2018-5390\", \"CVE-2018-5391\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:20:00 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:20:00 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kernel (EulerOS-SA-2018-1279)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP3\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2018-1279\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1279\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kernel' package(s) announced via the EulerOS-SA-2018-1279 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646)\n\nA flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)\n\nA flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.(CVE-2018-5391)\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Huawei EulerOS V2.0SP3.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP3\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~514.44.5.10.h134\", rl