An update rollup is available for Internet Explorer for Windows Embedded Compact 2013. This rollup resolves the security issues that are described in the following article:
CVE-2018-0935 | Scripting Engine Memory Corruption Vulnerability
Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.
View products that this article applies to.
An update rollup is available for Internet Explorer for Windows Embedded Compact 2013. This rollup resolves the security issues that are described in the following article:
CVE-2018-0935 | Scripting Engine Memory Corruption Vulnerability
The Windows Embedded Compact 2013 monthly update for April 2018 is now available from Microsoft. To download this Windows Embedded Compact 2013 monthly update, go to Microsoft OEM Online or the Device Partner Center (DPC).
This update is supported only if all previously issued updates for this product have also been installed.
After you apply this update, you must perform a clean build of the whole platform. To do this, use one of the following methods:
You don't have to restart the computer after you apply this software update.
This update doesn't replace any other updates.
The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.
File name | File size | Date | Time | Path |
---|---|---|---|---|
Jscript.dll | 790,528 | 16-Apr-2018 | 10:04 | Public\Html\Oak\Target\Armv7\Checked |
Jscript.map | 2,218,497 | 16-Apr-2018 | 10:04 | Public\Html\Oak\Target\Armv7\Checked |
Jscript.rel | 412,051 | 16-Apr-2018 | 10:04 | Public\Html\Oak\Target\Armv7\Checked |
Vbscript.dll | 585,728 | 16-Apr-2018 | 10:04 | Public\Html\Oak\Target\Armv7\Checked |
Vbscript.map | 1,755,023 | 16-Apr-2018 | 10:04 | Public\Html\Oak\Target\Armv7\Checked |
Vbscript.rel | 233,469 | 16-Apr-2018 | 10:04 | Public\Html\Oak\Target\Armv7\Checked |
Jscript.dll | 1,101,824 | 16-Apr-2018 | 10:03 | Public\Html\Oak\Target\Armv7\Debug |
Jscript.map | 2,742,101 | 16-Apr-2018 | 10:03 | Public\Html\Oak\Target\Armv7\Debug |
Jscript.rel | 386,067 | 16-Apr-2018 | 10:03 | Public\Html\Oak\Target\Armv7\Debug |
Vbscript.dll | 847,872 | 16-Apr-2018 | 10:03 | Public\Html\Oak\Target\Armv7\Debug |
Vbscript.map | 2,230,950 | 16-Apr-2018 | 10:03 | Public\Html\Oak\Target\Armv7\Debug |
Vbscript.rel | 228,423 | 16-Apr-2018 | 10:03 | Public\Html\Oak\Target\Armv7\Debug |
Jscript.dll | 487,424 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\Armv7\Retail |
Jscript.map | 1,017,965 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\Armv7\Retail |
Jscript.rel | 198,756 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\Armv7\Retail |
Vbscript.dll | 368,640 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\Armv7\Retail |
Vbscript.map | 847,369 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\Armv7\Retail |
Vbscript.rel | 118,977 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\Armv7\Retail |
Jscript.dll | 802,816 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Checked |
Jscript.map | 971,678 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Checked |
Jscript.rel | 508,969 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Checked |
Vbscript.dll | 610,304 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Checked |
Vbscript.map | 839,519 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Checked |
Vbscript.rel | 312,407 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Checked |
Jscript.dll | 1,122,304 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\X86\Debug |
Jscript.map | 990,841 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\X86\Debug |
Jscript.rel | 597,187 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\X86\Debug |
Vbscript.dll | 839,680 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\X86\Debug |
Vbscript.map | 870,025 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\X86\Debug |
Vbscript.rel | 370,639 | 16-Apr-2018 | 10:00 | Public\Html\Oak\Target\X86\Debug |
Jscript.dll | 491,520 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Retail |
Jscript.map | 480,707 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Retail |
Jscript.rel | 243,329 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Retail |
Vbscript.dll | 393,216 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Retail |
Vbscript.map | 403,438 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Retail |
Vbscript.rel | 163,811 | 16-Apr-2018 | 10:06 | Public\Html\Oak\Target\X86\Retail |
Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.
Learn about the terminology that Microsoft uses to describe software updates.
Keywords: kbsecurity, kblangall, kbmustloc, atdownload, kbsecvulnerability, kbexpertiseinter, kbsecreview, kb, kbnofix, kbfix, kbsurveynew, kbsecbulletin