Published on: 13 June 2018
Microsoft has released security updates addressing multiple vulnerabilities which affect several Microsoft products or components and enhancing the security as a defense in depth measure. The list of security updates can be found at:
https://support.microsoft.com/en-us/help/20180612/security-update-deployment-information
A complete list of the affected products can be found at:
https://portal.msrc.microsoft.com/en-us/security-guidance
Depending on the vulnerability exploited, a successful attack could lead to remote code execution, denial of service, elevation of privilege, information disclosure or security feature bypass.
Patches for affected products are available from the Windows Update/Microsoft Update Catalog. Users of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/7d4489d6-573f-e811-a96f-000d3a33c573
https://support.microsoft.com/en-us/help/20180612/security-update-deployment-information
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180015
https://www.hkcert.org/my_url/en/alert/18061301
https://www.us-cert.gov/ncas/current-activity/2018/06/12/Microsoft-Releases-June-2018-Security-Updates
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0871
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0978
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0982
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1036
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1040
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8111
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8121
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8140
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8169
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8201
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8205
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8207 (to CVE-2018-8219)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8221
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8224 (to CVE-2018-8227)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8229
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8231
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8233 (to CVE-2018-8236)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8239
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8243 (to CVE-2018-8249)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8251
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8252
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8254
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8267