Lucene search

K
mskbMicrosoftKB4022010
HistoryJun 13, 2017 - 7:00 a.m.

Windows kernel information disclosure vulnerability: June 13, 2017

2017-06-1307:00:00
Microsoft
support.microsoft.com
17

5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

4.9 Medium

AI Score

Confidence

High

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

29.3%

Windows kernel information disclosure vulnerability: June 13, 2017

Summary

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.

To learn more about the vulnerability, see CVE-2017-8488.

More Information

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Deployment information

For deployment details for this security update, see the following article in the Microsoft Knowledge Base:Security update deployment information: June 13, 2017

More Information

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2008 file information

**Note:**The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

How to obtain help and support for this security update

Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

File Information

File hash information

File name SHA1 hash SHA256 hash
Windows6.0-KB4022010-ia64.msu A840C7406BB3E3153721B771DA53EA832FC421E1 09C5BF6B752E1868043DA34DF22B1A4515F05A4677C0ADFD2C8D1123E756B851
Windows6.0-KB4022010-x64.msu C745EA2ABC09BA1D4ECF27FD26FF1E96E3F76F5D BC35C487FAE545C01BB2112C783E585C5D024EB25813A0BDEDB99AECE1AE9F30

For all supported ia64-based versions

File name File version File size Date Time Platform
Mountmgr.sys 6.0.6002.19784 167,656 10-May-2017 15:53 IA-64
Msmmsp.dll 6.0.6002.19784 23,552 10-May-2017 15:46 IA-64
Mountmgr.sys 6.0.6002.24102 167,656 10-May-2017 15:22 IA-64
Msmmsp.dll 6.0.6002.24102 23,552 10-May-2017 15:17 IA-64

For all supported x64-based versions

File name File version File size Date Time Platform
Mountmgr.sys 6.0.6002.19784 68,328 10-May-2017 16:12 x64
Msmmsp.dll 6.0.6002.19784 11,264 10-May-2017 16:06 x64
Mountmgr.sys 6.0.6002.24102 68,328 10-May-2017 18:09 x64
Msmmsp.dll 6.0.6002.24102 11,264 10-May-2017 18:03 x64

5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

4.9 Medium

AI Score

Confidence

High

1.9 Low

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

29.3%