Description of the security update for the remote code execution vulnerability in Visual Studio 2013 Update 5: July 10, 2018

Applies to: Visual Studio 2013 Update 5

Summary


A remote code execution vulnerability exists in Visual Studio software when the software fails to check the source markup of a file for an unbuilt project.

To learn more about the vulnerability, go to CVE-2018-8172.

How to obtain and install the update


Method 1: Microsoft Download

The following file is available for download:

Download Download the hotfix package now.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Deployment information


For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

More Information


Prerequisites

To apply this security update, you must have Visual Studio 2013 Update 5 installed.

File information


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.


Note The CAB, MSI, and MSP files also contain binaries that are not listed individually.