Table of contents
×

Release Date:

2/13/2018

Version:

Monthly Rollup

Improvements and fixes

This security update includes improvements and fixes that were a part of update KB4057400 (released January 19, 2018) and addresses the following issues:

  • Addresses issue with editing input fields in some applications in Internet Explorer.

  • Addresses a script-related issue that caused Internet Explorer to stop working in some cases.

  • Addresses issue with launching a new page in Internet Explorer.

  • Security updates to Internet Explorer, Windows Graphics, Windows Kernel, Common Log File System driver, Microsoft Windows Search component, and Windows storage and file systems.

For more information about the resolved security vulnerabilities, see the Security Update Guide.

Notes

Important Please apply KB4100480 immediately after applying this update. KB4100480 resolves an elevation of privilege vulnerability in the Windows Kernel for the 64-Bit (x64) version of Windows. This vulnerability is documented in CVE-2018-1038.

Known issues in this update

Symptom

Workaround

Because of an issue that affects some versions of antivirus software, this fix is being applied only to the computers on which the antivirus ISV have updated the ALLOW REGKEY.

This issue is resolved in KB4093118. You no longer need the following ALLOW REGKEY to detect and be offered this update: 

HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat\cadca5fe-87d3-4b96-b7fb-a231484277cc

The LSM.EXE process and applications that call SCardEstablishContext or SCardReleaseContext may experience a handle leak. Once the leaked handle count reaches a certain threshold, smart card-based operations fail with error "SCARD_E_NO_SERVICE". Confirm the scenario match by reviewing the handle counts for LSM.EXE and the calling processes in the process tab of Task Manager or an equivalent application.

This issue is resolved in KB4091290.

After installing KB4056897 or any other recent monthly updates, SMB servers may experience a memory leak for some scenarios. This occurs when the requested path traverses a symbolic link, mount point, or directory junction and the registry key is set to 1:  

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\LanManServer\Parameters\EnableEcp

This issue is resolved in KB4103718.

 

How to get this update

This update will be downloaded and installed automatically from Windows Update. To get the standalone package for this update, go to the Microsoft Update Catalog website.

File information

For a list of the files that are provided in this update, download the file information for update 4074598.

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×