Lucene search

K
mskbMicrosoftKB4042122
HistoryOct 10, 2017 - 7:00 a.m.

Description of the security update for the Microsoft graphics remote code execution vulnerability: October 10, 2017

2017-10-1007:00:00
Microsoft
support.microsoft.com
13

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.292 Low

EPSS

Percentile

96.9%

Description of the security update for the Microsoft graphics remote code execution vulnerability: October 10, 2017

Summary

A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts.

To learn more about the vulnerabilities, go to the Security Update Guide.

More Information

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Deployment information

For deployment details for this security update, see the following article in the Microsoft Knowledge Base:Security update deployment information: October 10, 2017

More Information

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows Server 2008 file information

**Note:**The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

How to obtain help and support for this security update

Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

File Information

File hash information

File name SHA1 hash SHA256 hash
Windows6.0-KB4042122-x86.msu 213A6043A4B2AFD1CA0D5DCA1504992144AFBE2E 309B94E64FF242A7589EBD116DD07EF268BB3F3914846165C5D5D3C0239B3B0B
Windows6.0-KB4042122-ia64.msu 3E394D7E9ADA5089B54FEB515F5BDA84E17F6013 16702A11F07274B2B96E763521A29C2C7E87880D5196B82F209DCBF22D6EAC65
Windows6.0-KB4042122-x64.msu DA311D1C7C695CBE4CDFD97FE5AD282A10AE76BE BA23508BD2BE6F9EA310E05D942E7B874E12918FB3C2731D6CD90956DC62B1FF

For all supported x86-based versions

File name File version File size Date Time Platform
T2embed.dll 6.0.6002.24200 157,696 08-Sep-2017 15:26 x86

For all supported ia64-based versions

File name File version File size Date Time Platform
T2embed.dll 6.0.6002.24200 402,944 08-Sep-2017 15:19 IA-64
T2embed.dll 6.0.6002.24200 157,696 08-Sep-2017 15:26 x86

For all supported x64-based versions

File name File version File size Date Time Platform
T2embed.dll 6.0.6002.24200 190,464 08-Sep-2017 19:18 x64
T2embed.dll 6.0.6002.24200 157,696 08-Sep-2017 15:26 x86

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.292 Low

EPSS

Percentile

96.9%