Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update for Expression Blend 4: July 10, 2018


View products that this article applies to.

Summary

A remote code execution vulnerability exists in Visual Studio software when the software does not check the source markup of a file for an unbuilt project.

To learn more about the vulnerability, go to CVE-2018-8172.

↑ Back to the top


How to obtain and install the update

Click here to download Microsoft Expression Blend 4 SP3. Note that you have to log on with your Visual Studio Subscription account when you are prompted. If you don’t have a Visual Studio Subscription, you can create one for free by clicking Create a new Microsoft account on the log-on page.

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File information

File hash information
FileName Sha1Hash Md5Hash Sha256Hash
Blend_SP3_en.exe 44CE052DBA398E47F190E95A4418BC81E721EF87 344DF3EC2EC365FA4137C7BCE7ABBAAF 1815CA52777C4495E6F3CED3628E21CE74772581D58648BFF1E298342692FC8B
Blend_SP3_de.exe 152CDCDCE6873AC557D3DB4CBEB59DD929DF7BA0 CF141221AFD233E03E0F4EF5FBC9C471 591F08B1185DEE98F1133533D31A3454C0516CAB66BA4FEBE4055F5C4D5E9C27
Blend_SP3_fr.exe B53FA1B5665F75B3C6504546EF3E5F46F761B566 BB16BE2A64CF92E1B7F89435B3B80DD4 AC149EBE4AC687077F911B82BD50A559B88E6B02CE0732749A8AB037FBA3798F
Blend_SP3_es.exe FC1E04A43C682D957D0C1B612153EF2426842A27 D9DA336B47FC1DC6128402A0986D3772 AC8AE6DB0F4FB7F3438DCD3A5901751B13585DAE86E3900E6EC56E74FBC90C57
Blend_SP3_it.exe CBABEEDBC5AD7E7BECD82473F70C2870B2F54A1F D3AB0835E3E8E7316CC31556539A0421 A5FBAA66464517532DA3258E5FCE51C66177A0ED644E4BA26F6DEEADC02144CE
Blend_SP3_ja.exe 7BB4F0AE9B626BC4549D9F3B4549A78B06F799DB 5534D0488E878E32D0AAAEA3A9AF7FB6 1C2CC6F87D1120AEFD95DADC148F820724FC10447C0A85D8C20EA59D7E404023
Blend_SP3_ko.exe 6EE53800F9B1B819A53E13410F0ED5E8D0A6949F 557B77EFDBE80FD0B7A049D781DA07EE 3D99713E00CA75AA840AFA0E4987316EAA0107E512EAA074ECB94F7536CE5BEE
Blend_SP3_zh-Hant.exe AC4CD61769C601382D3C2A53047AC214E3BC0A85 49CB498796AFE914ADC7B9CEFFBCC482 69181C26CAD804862BC6EF7FE64AC7082E05B4EA4E8F7A9A05C536728722CB13
Blend_SP3_zh-Hans.exe 5D4025195DE235761A97C6C8620E5560410980BE C9CCADA201B9ED6B8690C73C6E2713DF EEAE673E02EB7CB7D791F1FE6F62FA9F015A595DF1A38ACC8B5FF2AC26368F34

 

↑ Back to the top


Keywords: kbsurveynew, kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, kbfix, kblangall, kb, kbexpertiseinter, kbbug, atdownload, kbmustloc

↑ Back to the top

Article Info
Article ID : 4342193
Revision : 12
Created on : 7/31/2018
Published on : 8/1/2018
Exists online : False
Views : 109