{"openvas": [{"lastseen": "2020-06-10T19:51:39", "description": "This host is missing a critical security\n update according to Microsoft Bulletin MS15-065.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities (3076321)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1767", "CVE-2015-2401", "CVE-2015-2385", "CVE-2015-2422", "CVE-2015-1738", "CVE-2015-2391", "CVE-2015-2414", "CVE-2015-2383", "CVE-2015-2408", "CVE-2015-2413", "CVE-2015-1729", "CVE-2015-2404", "CVE-2015-2403", "CVE-2015-2410", "CVE-2015-2402", "CVE-2015-2419", "CVE-2015-2390", "CVE-2015-2397", "CVE-2015-2388", "CVE-2015-2398", "CVE-2015-2425", "CVE-2015-2411", "CVE-2015-1733", "CVE-2015-2412", "CVE-2015-2372", "CVE-2015-2384", "CVE-2015-2406", "CVE-2015-2421", "CVE-2015-2389"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310805720", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805720", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities (3076321)\n#\n# Authors:\n# Deependra Bapna <bdeependra@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:microsoft:ie\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805720\");\n script_version(\"2020-06-09T05:48:43+0000\");\n script_cve_id(\"CVE-2015-1729\", \"CVE-2015-1733\", \"CVE-2015-1767\", \"CVE-2015-2372\",\n \"CVE-2015-2383\", \"CVE-2015-2384\", \"CVE-2015-2385\", \"CVE-2015-2389\",\n \"CVE-2015-2390\", \"CVE-2015-2391\", \"CVE-2015-2397\", \"CVE-2015-2398\",\n \"CVE-2015-2401\", \"CVE-2015-2402\", \"CVE-2015-2403\", \"CVE-2015-2404\",\n \"CVE-2015-2388\", \"CVE-2015-2406\", \"CVE-2015-2408\", \"CVE-2015-2410\",\n \"CVE-2015-2411\", \"CVE-2015-2412\", \"CVE-2015-2413\", \"CVE-2015-2414\",\n \"CVE-2015-2419\", \"CVE-2015-2421\", \"CVE-2015-2422\", \"CVE-2015-2425\",\n \"CVE-2015-1738\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 05:48:43 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 12:14:36 +0530 (Wed, 15 Jul 2015)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities (3076321)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft Bulletin MS15-065.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws are due to improper\n handling memory objects when accessing it and does not properly validate\n permissions under specific conditions.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to corrupt memory and potentially execute arbitrary code in the\n context of the current user.\");\n\n script_tag(name:\"affected\", value:\"Microsoft Internet Explorer version 6.x/7.x/8.x/9.x/10.x/11.x and VBScript 5.8 on 8.x/9.x/10.x/11.x.\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3065822\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-065\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_ms_ie_detect.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"MS/IE/Version\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2, win7x64:2,\n win2008:3, win2008r2:2, win8:1, win8x64:1, win2012:1,\n win2012R2:1, win8_1:1, win8_1x64:1) <= 0){\n exit(0);\n}\n\nieVer = get_app_version(cpe:CPE);\nif(!ieVer || ieVer !~ \"^([6-9|1[01])\\.\"){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Mshtml.dll\");\nif(!dllVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win2003:3, win2003x64:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.0.3790.5662\") ||\n version_in_range(version:dllVer, test_version:\"7.0.6000.00000\", test_version2:\"7.0.6000.21480\")||\n version_in_range(version:dllVer, test_version:\"8.0.6001.18000\", test_version2:\"8.0.6001.23706\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nelse if(hotfix_check_sp(winVista:3, win2008:3) > 0)\n{\n if(version_in_range(version:dllVer, test_version:\"7.0.6002.18000\", test_version2:\"7.0.6002.19420\")||\n version_in_range(version:dllVer, test_version:\"7.0.6002.23000\", test_version2:\"7.0.6002.23727\")||\n version_in_range(version:dllVer, test_version:\"8.0.6001.18000\", test_version2:\"8.0.6001.19651\")||\n version_in_range(version:dllVer, test_version:\"8.0.6001.20000\", test_version2:\"8.0.6001.23706\")||\n version_in_range(version:dllVer, test_version:\"9.0.8112.16000\", test_version2:\"9.0.8112.16668\")||\n version_in_range(version:dllVer, test_version:\"9.0.8112.20000\", test_version2:\"9.0.8112.20783\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nelse if(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)\n{\n if(version_in_range(version:dllVer, test_version:\"8.0.7601.17000\", test_version2:\"8.0.7601.18895\")||\n version_in_range(version:dllVer, test_version:\"8.0.7601.22000\", test_version2:\"8.0.7601.23098\")||\n version_in_range(version:dllVer, test_version:\"9.0.8112.16000\", test_version2:\"9.0.8112.16668\")||\n version_in_range(version:dllVer, test_version:\"9.0.8112.20000\", test_version2:\"9.0.8112.20783\")||\n version_in_range(version:dllVer, test_version:\"10.0.9200.16000\", test_version2:\"10.0.9200.17411\")||\n version_in_range(version:dllVer, test_version:\"10.0.9200.21000\", test_version2:\"10.0.9200.21522\")||\n version_in_range(version:dllVer, test_version:\"11.0.9600.00000\", test_version2:\"11.0.9600.17914\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nelse if(hotfix_check_sp(win8:1, win2012:1) > 0)\n{\n if(version_in_range(version:dllVer, test_version:\"10.0.9200.16000\", test_version2:\"10.0.9200.17411\")||\n version_in_range(version:dllVer, test_version:\"10.0.9200.20000\", test_version2:\"10.0.9200.21522\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nelse if(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"11.0.9600.17905\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-10T19:50:41", "description": "This host is missing an important security\n update according to Microsoft Bulletin MS15-073.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "MS Windows Kernel-Mode Driver Privilege Elevation Vulnerabilities (3070102)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2367", "CVE-2015-2365", "CVE-2015-2366", "CVE-2015-2363", "CVE-2015-2382", "CVE-2015-2381"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310805074", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805074", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# MS Windows Kernel-Mode Driver Privilege Elevation Vulnerabilities (3070102)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805074\");\n script_version(\"2020-06-09T05:48:43+0000\");\n script_cve_id(\"CVE-2015-2363\", \"CVE-2015-2365\", \"CVE-2015-2366\", \"CVE-2015-2367\",\n \"CVE-2015-2381\", \"CVE-2015-2382\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 05:48:43 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 08:32:59 +0530 (Wed, 15 Jul 2015)\");\n script_name(\"MS Windows Kernel-Mode Driver Privilege Elevation Vulnerabilities (3070102)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS15-073.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An improper handling of buffer elements by windows kernel-mode driver under\n certain conditions.\n\n - An improper freeing of an object in memory by windows kernel-mode driver.\n\n - Improper handling of buffer elements by windows kernel-mode driver under\n certain conditions.\n\n - Improper freeing of an object in memory by windows kernel-mode driver.\n\n - Insufficient validation of certain data passed from user mode by the windows\n kernel-mode driver.\n\n - Windows kernel-mode driver when it accesses an object in memory that has\n either not been correctly initialized or deleted.\n\n - Windows kernel-mode driver when it improperly validates user input.\n\n - Windows kernel-mode driver 'Win32k.sys' fails to properly free memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass security, gain elevated privileges and execute arbitrary\n code on affected system.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 8 x32/x64\n\n - Microsoft Windows Server 2012/R2\n\n - Microsoft Windows 8.1 x32/x64\n\n - Microsoft Windows 2003 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Vista x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows 7 x32/x64 Service Pack 1 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3070102\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-073\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/ms15-073\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2, win7x64:2,\n win2008:3, win2008r2:2, win8:1, win8x64:1, win2012:1,\n win2012R2:1, win8_1:1, win8_1x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Win32k.sys\");\nif(!dllVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win2003:3, win2003x64:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"5.2.3790.5667\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Currently not supporting for Vista and Windows Server 2008 64 bit\nif(hotfix_check_sp(winVista:3, win2008:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.0.6002.19429\") ||\n version_in_range(version:dllVer, test_version:\"6.0.6002.23000\", test_version2:\"6.0.6002.23734\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.1.7601.18906\") ||\n version_in_range(version:dllVer, test_version:\"6.1.7601.22000\", test_version2:\"6.1.7601.23108\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win8:1, win8x64:1, win2012:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.2.9200.17419\") ||\n version_in_range(version:dllVer, test_version:\"6.2.9200.20000\", test_version2:\"6.2.9200.21527\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Win 8.1 and win2012R2\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.3.9600.17915\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-10T19:49:49", "description": "This host is missing a critical security\n update according to Microsoft Bulletin MS15-068.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "MS Windows Hyper-V Remote Code Execution Vulnerability (3072000)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2362", "CVE-2015-2361"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310805922", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805922", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# MS Windows Hyper-V Remote Code Execution Vulnerability (3072000)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805922\");\n script_version(\"2020-06-09T05:48:43+0000\");\n script_cve_id(\"CVE-2015-2361\", \"CVE-2015-2362\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 05:48:43 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 13:50:29 +0530 (Wed, 15 Jul 2015)\");\n script_name(\"MS Windows Hyper-V Remote Code Execution Vulnerability (3072000)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft Bulletin MS15-068.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flaws exists due to,\n\n - An error in how Hyper-V handles packet size memory initialization in guest\n virtual machines.\n\n - An error in how Hyper-V initializes system data structures in guest virtual\n machines.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attacker to execute arbitrary code on affected system.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 8 x64\n\n - Microsoft Windows 8.1 x64\n\n - Microsoft Windows Server 2012/2012R2\n\n - Microsoft Windows Server 2008 x64 Service Pack 2\n\n - Microsoft Windows Server 2008 R2 x64 Service Pack 1\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3046359\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-068\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2008r2:2, win8x64:1, win2012:1, win2012R2:1,\n win8_1x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"System32\\Vmicvss.dll\");\ndllVer2 = fetch_file_version(sysPath:sysPath, file_name:\"System32\\drivers\\Storvsp.sys\");\nif(!dllVer && !dllVer2){\n exit(0);\n}\n\nif(hotfix_check_sp(win2008r2:2) > 0 && dllVer)\n{\n if(version_is_less(version:dllVer, test_version:\"6.1.7601.18844\") ||\n version_in_range(version:dllVer, test_version:\"6.1.7601.22000\", test_version2:\"6.1.7601.23044\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win8x64:1, win2012:1) > 0 && dllVer)\n{\n if(version_is_less(version:dllVer, test_version:\"6.2.9200.17361\") ||\n version_in_range(version:dllVer, test_version:\"6.2.9200.20000\", test_version2:\"6.2.9200.21472\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Win 8.1 and win2012R2\nif(hotfix_check_sp(win8_1x64:1, win2012R2:1) > 0)\n{\n if((dllVer && version_is_less(version:dllVer, test_version:\"6.3.9600.17723\"))||\n (dllVer2 && version_is_less(version:dllVer2, test_version:\"6.3.9600.17723\"))){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-10T19:50:14", "description": "This host is missing an important security\n update according to Microsoft Bulletin MS15-069.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft Windows Remote Code Execution (3072631)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2369", "CVE-2015-2368"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310805721", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805721", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Remote Code Execution (3072631)\n#\n# Authors:\n# Deependra Bapna <bdeependra@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:microsoft:rdp\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805721\");\n script_version(\"2020-06-09T05:48:43+0000\");\n script_cve_id(\"CVE-2015-2368\", \"CVE-2015-2369\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 05:48:43 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 12:14:36 +0530 (Wed, 15 Jul 2015)\");\n script_name(\"Microsoft Windows Remote Code Execution (3072631)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS15-069.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple flows are due to improperly handling\n of the loading of dynamic link library (DLL) files.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to bypass security, gain elevated privileges and execute arbitrary\n code on affected system.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows Server 2012 R2\n\n - Microsoft Windows 8.1 x32/x64\n\n - Microsoft Windows 2003 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Vista x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows 7 x32/x64 Service Pack 1 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3072631\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-069\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"gb_rdp_version_detect_win.nasl\");\n script_mandatory_keys(\"remote/desktop/protocol/Win/Installed\");\n script_require_ports(139, 445);\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/ms15-069.aspx\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2, win7x64:2,\n win2008:3, win2008r2:2, win2012R2:1, win8_1:1, win8_1x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\nCeVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Cewmdm.dll\");\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Wcewmdm.dll\");\nexeVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Wksprt.exe\");\nalVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Atlthunk.dll\");\nalVer1 = fetch_file_version(sysPath:sysPath, file_name:\"SysWOW64\\Atlthunk.dll\");\nif(alVer1){\n alVer164 = sysPath + \"\\SysWOW64\\Atlthunk.dll\";\n}\n\n\nif(!CeVer && !dllVer && !exeVer && !alVer && !alVer1){\n exit(0);\n}\n\nrdpVer = get_app_version(cpe:CPE);\n\ncleanPath = sysPath + \"\\system32\\cleanmgr.exe\";\n\nshare = ereg_replace(pattern:\"([A-Z]):.*\", replace:\"\\1$\", string:cleanPath);\nfile = ereg_replace(pattern:\"[A-Z]:(.*)\", replace:\"\\1\", string:cleanPath);\nexeSize = get_file_size(share:share, file:file);\n\nif(hotfix_check_sp(win2003:3) > 0 && CeVer)\n{\n if(version_is_less(version:CeVer, test_version:\"10.0.3790.4011\"))\n {\n Vulnerable_range = \"Less than 10.0.3790.4011\";\n VULN1 = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win2003x64:3) > 0 && dllVer)\n{\n if(version_is_less(version:dllVer, test_version:\"10.0.3790.4011\"))\n {\n Vulnerable_range = \"Less than 10.0.3790.4011\";\n VULN2 = TRUE ;\n }\n}\n\n\n## Currently not supporting for Vista and Windows Server 2008 64 bit\nelse if(hotfix_check_sp(winVista:3) > 0 && CeVer)\n{\n if(version_is_less(version:CeVer, test_version:\"11.0.6002.19403\"))\n {\n Vulnerable_range = \"Less than 11.0.6002.19403\";\n VULN1 = TRUE ;\n }\n else if(version_in_range(version:CeVer, test_version:\"11.0.6002.23000\", test_version2:\"11.0.6002.23709\"))\n {\n Vulnerable_range = \"11.0.6002.23000 - 11.0.6002.23709\";\n VULN1 = TRUE ;\n }\n}\n\n## Currently not supporting for Windows Server 2008 64 bit\nelse if(hotfix_check_sp(win2008:3) > 0 && CeVer && exeSize)\n{\n if(version_is_less(version:CeVer, test_version:\"11.0.6002.19403\"))\n {\n Vulnerable_range = \"Less than 11.0.6002.19403\";\n VULN1 = TRUE ;\n }\n else if(version_in_range(version:CeVer, test_version:\"11.0.6002.23000\", test_version2:\"11.0.6002.23709\"))\n {\n Vulnerable_range = \"11.0.6002.23000 - 11.0.6002.23709\";\n VULN1 = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win7:2, win7x64:2) > 0)\n{\n ## For RDP 8.1 Mstscax.dll version is greater than or equals to 6.3.9600.00000 and less than 6.3.9601.00000\n if(version_in_range(version:rdpVer, test_version:\"6.3.9600.00000\", test_version2:\"6.3.9600.99999\"))\n {\n if((exeVer && version_is_less(version:exeVer, test_version:\"6.3.9600.17901\")))\n {\n Vulnerable_range = \"Less than 6.3.9600.17901\";\n VULN3 = TRUE ;\n }\n }\n\n else if(CeVer && (version_is_less(version:CeVer, test_version:\"12.0.7601.18872\")))\n {\n Vulnerable_range = \"Less than 12.0.7601.18872\";\n VULN1 = TRUE ;\n }\n\n else if(CeVer && (version_in_range(version:CeVer, test_version:\"12.0.7601.22000\", test_version2:\"12.0.7601.23074\")))\n {\n Vulnerable_range = \"12.0.7601.22000 - 12.0.7601.23074\";\n VULN1 = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win2008r2:2) > 0)\n{\n ## For RDP 8.1 Mstscax.dll version is greater than or equals to 6.3.9600.00000 and less than 6.3.9601.00000\n if(version_in_range(version:rdpVer, test_version:\"6.3.9600.00000\", test_version2:\"6.3.9600.99999\"))\n {\n if((exeVer && version_is_less(version:exeVer, test_version:\"6.3.9600.17901\")))\n {\n Vulnerable_range = \"Less than 6.3.9600.17901\";\n VULN3 = TRUE ;\n }\n }\n\n else if(CeVer && exeSize && (version_is_less(version:CeVer, test_version:\"12.0.7601.18872\")))\n {\n Vulnerable_range = \"Less than 12.0.7601.18872\";\n VULN1 = TRUE ;\n }\n\n else if(CeVer && exeSize && (version_in_range(version:CeVer, test_version:\"12.0.7601.22000\", test_version2:\"12.0.7601.23074\")))\n {\n Vulnerable_range = \"12.0.7601.22000 - 12.0.7601.23074\";\n VULN1 = TRUE ;\n }\n}\n\n## Win 8.1\nelse if(hotfix_check_sp(win8_1:1) > 0 && alVer)\n{\n if(version_is_less(version:alVer, test_version:\"6.3.9600.17415\"))\n {\n Vulnerable_range = \"Less than 6.3.9600.17415\";\n VULN4 = TRUE ;\n }\n}\n\n## Win 8.1 and 2012 x64\nelse if(hotfix_check_sp(win8x64:1, win2012:1) > 0 && alVer1)\n{\n if(version_is_less(version:alVer1, test_version:\"6.3.9600.17670\"))\n {\n Vulnerable_range = \"Less than 6.3.9600.17670\";\n VULN5 = TRUE ;\n }\n}\n\nif(VULN1)\n{\n report = 'File checked: ' + sysPath + \"\\System32\\Cewmdm.dll\" + '\\n' +\n 'File version: ' + CeVer + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range + '\\n' ;\n security_message(data:report);\n exit(0);\n}\n\nif(VULN2)\n{\n report = 'File checked: ' + sysPath + \"\\System32\\Wcewmdm.dll\" + '\\n' +\n 'File version: ' + dllVer + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range + '\\n' ;\n security_message(data:report);\n exit(0);\n}\n\nif(VULN3)\n{\n report = 'File checked: ' + sysPath + \"\\System32\\Wksprt.exe\" + '\\n' +\n 'File version: ' + exeVer + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range + '\\n' ;\n security_message(data:report);\n exit(0);\n}\n\nif(VULN4)\n{\n report = 'File checked: ' + sysPath + \"\\System32\\Atlthunk.dll\" + '\\n' +\n 'File version: ' + alVer + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range + '\\n' ;\n security_message(data:report);\n exit(0);\n}\n\nif(VULN5)\n{\n report = 'File checked: ' + alVer164 + '\\n' +\n 'File version: ' + alVer1 + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range + '\\n' ;\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-08T14:00:16", "description": "This host is missing an important security\n update according to Microsoft Bulletin MS15-075.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft Windows OLE Privilege Elevation Vulnerability (3072633)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2417", "CVE-2015-2416"], "modified": "2019-12-20T00:00:00", "id": "OPENVAS:1361412562310805677", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805677", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows OLE Privilege Elevation Vulnerability (3072633)\n#\n# Authors:\n# Rinu Kuriakose <krinu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805677\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2015-2416\", \"CVE-2015-2417\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 08:49:13 +0530 (Wed, 15 Jul 2015)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft Windows OLE Privilege Elevation Vulnerability (3072633)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS15-075.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to Microsoft Windows\n incorrectly handles OLE objects in documents.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers\n to bypass security protections on affected systems.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 8 x32/x64\n\n - Microsoft Windows 8.1 x32/x64\n\n - Microsoft Windows Server 2012\n\n - Microsoft Windows Server 2012R2\n\n - Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior\n\n - Microsoft Windows Vista x32/x64 Edition Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior\n\n - Microsoft Windows 7 x32/x64 Edition Service Pack 1 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3072633\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/library/security/MS15-075\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2, win7x64:2,\n win2008:3, win2008r2:2, win8:1, win8x64:1, win8_1:1,\n win8_1x64:1, win2012:1, win2012R2:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Ole32.dll\");\nif(!dllVer){\n exit(0);\n}\n\n## Currently not supporting for Vista and Windows Server 2008 64 bit\nif(hotfix_check_sp(winVista:3, win2008:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.0.6002.19435\") ||\n version_in_range(version:dllVer, test_version:\"6.0.6002.23000\", test_version2:\"6.0.6002.23742\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win2003:3, win2003x64:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"5.2.3790.5663\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.1.7601.18896\") ||\n version_in_range(version:dllVer, test_version:\"6.1.7601.22000\", test_version2:\"6.1.7601.23098\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Win 8 and 2012\nif(hotfix_check_sp(win8:1, win8x64:1, win2012:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.2.9200.17414\") ||\n version_in_range(version:dllVer, test_version:\"6.2.9200.20000\", test_version2:\"6.2.9200.21523\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Win 8.1 and win2012R2\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.3.9600.17905\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-06-10T19:51:43", "description": "This host is missing an important security\n update according to Microsoft Bulletin MS15-077.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft ATM Font Driver Privilege Elevation Vulnerability (3077657)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2387"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310805073", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805073", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft ATM Font Driver Privilege Elevation Vulnerability (3077657)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805073\");\n script_version(\"2020-06-09T05:48:43+0000\");\n script_cve_id(\"CVE-2015-2387\");\n script_bugtraq_id(75587);\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 05:48:43 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 08:18:46 +0530 (Wed, 15 Jul 2015)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft ATM Font Driver Privilege Elevation Vulnerability (3077657)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS15-077.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An elevation of privilege vulnerability\n exists in Adobe Type Manager Font Driver (ATMFD) when it fails to properly\n handle objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to execute arbitrary code with kernel-mode privileges and take\n complete control of the affected system.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 8 x32/x64\n\n - Microsoft Windows Server 2012/R2\n\n - Microsoft Windows 8.1 x32/x64\n\n - Microsoft Windows Server 2012\n\n - Microsoft Windows Server 2012R2\n\n - Microsoft Windows 7 x32/x64 Service Pack 1 and prior\n\n - Microsoft Windows 2003 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Vista x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior\n\n - Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3077657\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/library/security/MS15-077\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2, win7x64:2,\n win2008:3, win2008r2:2, win8:1, win8x64:1, win2012:1,\n win2012R2:1, win8_1:1, win8_1x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\nuserVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Atmfd.dll\");\nif(!userVer){\n exit(0);\n}\n\n\nif(hotfix_check_sp(win2003:3, win2003x64:3) > 0)\n{\n if(version_is_less(version:userVer, test_version:\"5.2.2.242\")){\n report = report_fixed_ver(installed_version:userVer, fixed_version:\"5.2.2.242\", install_path:sysPath);\n security_message(port: 0, data: report);\n }\n exit(0);\n}\n\n## Win 8.1 and win2012R2\nif(hotfix_check_sp(winVista:3, win2008:3, win7:2, win7x64:2, win2008r2:2, win8:1,\n win8x64:1, win2012:1, win8_1:1, win8_1x64:1, win2012R2:1) > 0)\n{\n if(version_is_less(version:userVer, test_version:\"5.1.2.242\")){\n report = report_fixed_ver(installed_version:userVer, fixed_version:\"5.1.2.242\", install_path:sysPath);\n security_message(port: 0, data: report);\n }\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-08T13:59:41", "description": "This host is missing an important security\n update according to Microsoft Bulletin MS15-071.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft Windows NETLOGON Privilege Elevation Vulnerability (3068457)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2374"], "modified": "2019-12-20T00:00:00", "id": "OPENVAS:1361412562310805075", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805075", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows NETLOGON Privilege Elevation Vulnerability (3068457)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805075\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2015-2374\");\n script_bugtraq_id(75633);\n script_tag(name:\"cvss_base\", value:\"3.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:A/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 09:12:11 +0530 (Wed, 15 Jul 2015)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft Windows NETLOGON Privilege Elevation Vulnerability (3068457)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS15-071.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Flaw is due to Netlogon service improperly\n establishes a secure communications channel belonging to a different machine\n with a spoofed computer name.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n man-in-the-middle attacker to conduct SMB relay attacks on domain environments\n utilizing SMB Signing enforcement, and decrypt SMB3 communications intercepted.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows Server 2012/R2\n\n - Microsoft Windows 2003 x32/x64 Edition Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior\n\n - Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3068457\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-071\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, win2008:3,\n win2008r2:2, win2012:1, win2012R2:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Netlogon.dll\");\nif(!dllVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win2003x64:3,win2003:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"5.2.3790.5648\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Currently not supporting for Windows Server 2008 64 bit\nif(hotfix_check_sp(win2008:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.0.6002.19409\") ||\n version_in_range(version:dllVer, test_version:\"6.0.6002.23000\", test_version2:\"6.0.6002.23715\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win2008r2:2) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.1.7601.18880\") ||\n version_in_range(version:dllVer, test_version:\"6.1.7601.23000\", test_version2:\"6.1.7601.23082\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win2012:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.2.9200.17395\") ||\n version_in_range(version:dllVer, test_version:\"6.2.9200.20000\", test_version2:\"6.2.9200.21505\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## win2012R2\nif(hotfix_check_sp(win2012R2:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.3.9600.17901\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 3.3, "vector": "AV:A/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-01-08T14:00:31", "description": "This host is missing a critical security\n update according to Microsoft Bulletin MS15-067.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft Windows Remote Desktop Remote Code Execution Vulnerability (3073094)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2373"], "modified": "2019-12-20T00:00:00", "id": "OPENVAS:1361412562310805077", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805077", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Remote Desktop Remote Code Execution Vulnerability (3073094)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805077\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2015-2373\");\n script_tag(name:\"cvss_base\", value:\"10.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 11:26:05 +0530 (Wed, 15 Jul 2015)\");\n script_name(\"Microsoft Windows Remote Desktop Remote Code Execution Vulnerability (3073094)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft Bulletin MS15-067.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Flaw exists due to error in the Remote Desktop\n Protocol (RDP) that is triggered when handling multiple RDP sessions that fail\n to properly free objects in memory.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause an exhaustion of memory resources and cause the system to\n stop responding.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 8 x32/x64\n\n - Microsoft Windows Server 2012\n\n - Microsoft Windows 7 x32/x64 Service Pack 1 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3073094\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3069762\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3067904\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/library/security/MS15-067\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_require_ports(139, 445);\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win7:2, win7x64:2, win8:1, win8x64:1, win2008r2:2, win2012:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath){\n exit(0);\n}\n\nRdpVer = fetch_file_version(sysPath:sysPath, file_name:\"\\system32\\Rdpcorets.dll\");\nif(!RdpVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)\n{\n if(version_is_less(version:RdpVer, test_version:\"6.1.7601.18892\") ||\n version_in_range(version:RdpVer, test_version:\"6.1.7601.23000\", test_version2:\"6.1.7601.23094\") ||\n version_in_range(version:RdpVer, test_version:\"6.2.9200.16000\", test_version2:\"6.2.9200.17394\") ||\n version_in_range(version:RdpVer, test_version:\"6.2.9200.21000\", test_version2:\"6.2.9200.21505\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win8:1, win8x64:1, win2012:1) > 0)\n{\n if(version_is_less(version:RdpVer, test_version:\"6.2.9200.17395\") ||\n version_in_range(version:RdpVer, test_version:\"6.2.9200.20000\", test_version2:\"6.2.9200.21505\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-10T19:50:21", "description": "This host is missing an important security\n update according to Microsoft Bulletin MS15-076.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "MS Windows Remote Procedure Call Privilege Elevation Vulnerability (3067505)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2370"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310805921", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805921", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# MS Windows Remote Procedure Call Privilege Elevation Vulnerability (3067505)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805921\");\n script_version(\"2020-06-09T05:48:43+0000\");\n script_cve_id(\"CVE-2015-2370\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 05:48:43 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 12:11:27 +0530 (Wed, 15 Jul 2015)\");\n script_name(\"MS Windows Remote Procedure Call Privilege Elevation Vulnerability (3067505)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS15-076.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw occurs when Windows RPC\n inadvertently allows DCE/RPC connection reflection.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attacker to gain privileged access.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 2003 x32/x64 Service Pack 2\n\n - Microsoft Windows Vista x32/x64 Service Pack 2\n\n - Microsoft Windows Server 2008 x32/x64 Service Pack 2\n\n - Microsoft Windows 7 x32/x64 Service Pack 1\n\n - Microsoft Windows Server 2008 R2 x64 Service Pack 1\n\n - Microsoft Windows 8 x32/x64\n\n - Microsoft Windows 8.1 x32/x64\n\n - Microsoft Windows Server 2012/2012R2\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"executable_version\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3067505\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-076\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2, win7x64:2, win2008:3,\n win2008r2:2, win8:1, win8x64:1, win2012:1, win2012R2:1, win8_1:1,\n win8_1x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"System32\\Kerberos.dll\");\nif(!dllVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win2003x64:3,win2003:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"5.2.3790.5669\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Currently not supporting for Vista and Windows Server 2008 64 bit\nif(hotfix_check_sp(winVista:3, win2008:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.0.6002.19431\") ||\n version_in_range(version:dllVer, test_version:\"6.0.6002.23000\", test_version2:\"6.0.6002.23736\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.1.7601.18909\") ||\n version_in_range(version:dllVer, test_version:\"6.1.7601.22000\", test_version2:\"6.1.7601.23111\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win8:1, win8x64:1, win2012:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.2.9200.17420\") ||\n version_in_range(version:dllVer, test_version:\"6.2.9200.20000\", test_version2:\"6.2.9200.21528\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Win 8.1 and win2012R2\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.3.9600.17918\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-10T19:51:50", "description": "This host is missing an important security\n update according to Microsoft Bulletin MS15-074.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft Windows Installer Service Privilege Escalation Vulnerarbility (3072630)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2371"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310805078", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805078", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Installer Service Privilege Escalation Vulnerarbility (3072630)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805078\");\n script_version(\"2020-06-09T05:48:43+0000\");\n script_cve_id(\"CVE-2015-2371\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 05:48:43 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 09:12:38 +0530 (Wed, 15 Jul 2015)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft Windows Installer Service Privilege Escalation Vulnerarbility (3072630)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS15-074.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An elevation of privilege vulnerability exists\n in some cases in the Windows Installer service when it improperly runs custom\n action scripts.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attackers to\n elevate privileges on a targeted system.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 8 x32/x64\n\n - Microsoft Windows 8.1 x32/x64\n\n - Microsoft Windows 10 x32/x64\n\n - Microsoft Windows Server 2012/R2\n\n - Microsoft Windows 2003 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Vista x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows 7 x32/x64 Service Pack 1 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Service Pack 1 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3072630\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-074\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2, win7x64:2,\n win2008:3, win2008r2:2, win8:1, win8x64:1, win2012:1,\n win2012R2:1, win8_1:1, win8_1x64:1, win10:1, win10x64:1) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath){\n exit(0);\n}\n\nmsiVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\msi.dll\");\nif(!msiVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win2003x64:3, win2003:3) > 0)\n{\n if(version_is_less(version:msiVer, test_version:\"4.5.6002.23731\"))\n {\n Vulnerable_range = \"Less than 4.5.6002.23731\";\n VULN = TRUE ;\n }\n}\n\n## Currently not supporting for Vista and Windows Server 2008 64 bit\nelse if(hotfix_check_sp(winVista:3, win2008:3) > 0)\n{\n if(version_is_less(version:msiVer, test_version:\"4.5.6002.19424\"))\n {\n Vulnerable_range = \"Less than 4.5.6002.19424\";\n VULN = TRUE ;\n }\n else if(version_in_range(version:msiVer, test_version:\"4.5.6002.23000\", test_version2:\"4.5.6002.23729\"))\n {\n Vulnerable_range = \"4.5.6002.23000\" - \"4.5.6002.23729\";\n VULN = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)\n{\n if(version_is_less(version:msiVer, test_version:\"5.0.7601.18896\"))\n {\n Vulnerable_range = \"Less than 5.0.7601.18896\";\n VULN = TRUE ;\n }\n else if(version_in_range(version:msiVer, test_version:\"5.0.7601.22000\", test_version2:\"5.0.7601.23098\"))\n {\n Vulnerable_range = \"5.0.7601.22000\" - \"5.0.7601.23098\";\n VULN = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win8:1, win8x64:1, win2012:1) > 0)\n{\n if(version_is_less(version:msiVer, test_version:\"5.0.9200.17412\"))\n {\n Vulnerable_range = \"Less than 5.0.9200.17412\";\n VULN = TRUE ;\n }\n else if(version_in_range(version:msiVer, test_version:\"5.0.9200.21000\", test_version2:\"5.0.9200.21522\"))\n {\n Vulnerable_range = \"5.0.9200.21000\" - \"5.0.9200.21522\";\n VULN = TRUE ;\n }\n}\n\n## Win 8.1 and win2012R2\nelse if(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) > 0)\n{\n if(version_is_less(version:msiVer, test_version:\"5.0.9600.17905\"))\n {\n Vulnerable_range = \"Less than 5.0.9600.17905\";\n VULN = TRUE ;\n }\n}\n\nelse if(hotfix_check_sp(win10:1, win10x64:1) > 0)\n{\n if(version_is_less(version:msiVer, test_version:\"5.0.10240.16386\"))\n {\n Vulnerable_range = \"Less than 5.0.10240.16386\";\n VULN = TRUE ;\n }\n}\n\nif(VULN)\n{\n report = 'File checked: ' + sysPath + \"\\system32\\msi.dll\" + '\\n' +\n 'File version: ' + msiVer + '\\n' +\n 'Vulnerable range: ' + Vulnerable_range + '\\n' ;\n security_message(data:report);\n exit(0);\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-08T14:00:22", "description": "This host is missing an important security\n update according to Microsoft Bulletin MS15-072.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft Windows Graphics Component Privilege Elevation Vulnerability (3069392)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2364"], "modified": "2019-12-20T00:00:00", "id": "OPENVAS:1361412562310805920", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805920", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows Graphics Component Privilege Elevation Vulnerability (3069392)\n#\n# Authors:\n# Shakeel <bshakeel@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805920\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2015-2364\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 11:06:14 +0530 (Wed, 15 Jul 2015)\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_name(\"Microsoft Windows Graphics Component Privilege Elevation Vulnerability (3069392)\");\n\n script_tag(name:\"summary\", value:\"This host is missing an important security\n update according to Microsoft Bulletin MS15-072.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Flaw exists due to error when windows\n graphics component fails to properly process bitmap conversions.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to gain elevated privileges.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 8 x32/x64\n\n - Microsoft Windows 8.1 x32/x64\n\n - Microsoft Windows Server 2012\n\n - Microsoft Windows Server 2012 R2\n\n - Microsoft Windows 7 x32/x64 Edition Service Pack 1\n\n - Microsoft Windows 2003 x32/x64 Edition Service Pack 2\n\n - Microsoft Windows Vista x32/x64 Edition Service Pack 2\n\n - Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1\n\n - Microsoft Windows Server 2008 x32/x64 Edition Service Pack 2\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3069392\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-072\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win7:2, win7x64:2,\n win2008:3, win2008r2:2, win8:1, win8x64:1, win2012:1,\n win2012R2:1, win8_1:1, win8_1x64:1) <= 0)\n{\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Gdi32.dll\");\nif(!dllVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win2003x64:3,win2003:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"5.2.3790.5661\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Currently not supporting for Vista and Windows Server 2008 64 bit\nif(hotfix_check_sp(winVista:3, win2008:3) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.0.6002.19421\")||\n version_in_range(version:dllVer, test_version:\"6.0.6002.23000\", test_version2:\"6.0.6002.23727\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win7:2, win7x64:2, win2008r2:2) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.1.7601.18898\") ||\n version_in_range(version:dllVer, test_version:\"6.1.7601.22000\", test_version2:\"6.1.7601.23099\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win8:1, win2012:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.2.9200.17410\")||\n version_in_range(version:dllVer, test_version:\"6.2.9200.20000\", test_version2:\"6.2.9200.21520\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win8_1:1, win8_1x64:1, win2012R2:1) > 0)\n{\n if(version_is_less(version:dllVer, test_version:\"6.3.9600.17902\")){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-01-08T14:00:54", "description": "This host is missing a critical security\n update according to Microsoft Bulletin MS15-066.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "openvas", "title": "Microsoft Windows VBScript Remote Code Execution Vulnerability (3072604)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2372"], "modified": "2019-12-20T00:00:00", "id": "OPENVAS:1361412562310805076", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310805076", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Microsoft Windows VBScript Remote Code Execution Vulnerability (3072604)\n#\n# Authors:\n# Antu Sanadi <santu@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2015 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.805076\");\n script_version(\"2019-12-20T10:24:46+0000\");\n script_cve_id(\"CVE-2015-2372\");\n script_tag(name:\"cvss_base\", value:\"9.3\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-12-20 10:24:46 +0000 (Fri, 20 Dec 2019)\");\n script_tag(name:\"creation_date\", value:\"2015-07-15 10:14:46 +0530 (Wed, 15 Jul 2015)\");\n script_name(\"Microsoft Windows VBScript Remote Code Execution Vulnerability (3072604)\");\n\n script_tag(name:\"summary\", value:\"This host is missing a critical security\n update according to Microsoft Bulletin MS15-066.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Flaw exists due to error in VBScript that is\n triggered as user-supplied input is not properly validated.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to execute arbitrary code and corrupt memory.\");\n\n script_tag(name:\"affected\", value:\"- Microsoft Windows 2003 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Vista x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 x32/x64 Service Pack 2 and prior\n\n - Microsoft Windows Server 2008 R2 x64 Edition Service Pack 1 and prior\");\n\n script_tag(name:\"solution\", value:\"The vendor has released updates. Please see the references for more information.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"executable_version\");\n script_xref(name:\"URL\", value:\"https://support.microsoft.com/en-us/kb/3072604\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/en-us/library/security/MS15-066\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2015 Greenbone Networks GmbH\");\n script_family(\"Windows : Microsoft Bulletins\");\n script_dependencies(\"smb_reg_service_pack.nasl\");\n script_require_ports(139, 445);\n script_mandatory_keys(\"SMB/WindowsVersion\");\n script_xref(name:\"URL\", value:\"https://technet.microsoft.com/library/security/MS15-066\");\n exit(0);\n}\n\n\ninclude(\"smb_nt.inc\");\ninclude(\"host_details.inc\");\ninclude(\"secpod_reg.inc\");\ninclude(\"version_func.inc\");\ninclude(\"secpod_smb_func.inc\");\n\nif(hotfix_check_sp(win2003:3, win2003x64:3, winVista:3, win2008:3,\n win2008r2:2) <= 0){\n exit(0);\n}\n\nsysPath = smb_get_systemroot();\nif(!sysPath ){\n exit(0);\n}\n\ndllVer = fetch_file_version(sysPath:sysPath, file_name:\"system32\\Vbscript.dll\");\nif(!dllVer){\n exit(0);\n}\n\nif(hotfix_check_sp(win2003:3, win2003x64:3) > 0)\n{\n if((version_in_range(version:dllVer, test_version:\"5.6\", test_version2:\"5.6.0.8855\")) ||\n (version_in_range(version:dllVer, test_version:\"5.7\", test_version2:\"5.7.6002.23711\"))){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\n## Currently not supporting for Vista and Windows Server 2008 64 bit\nif(hotfix_check_sp(winVista:3, win2008:3) > 0)\n{\n if((version_in_range(version:dllVer, test_version:\"5.7\", test_version2:\"5.7.6002.19404\")) ||\n (version_in_range(version:dllVer, test_version:\"5.7.6002.23000\", test_version2:\"5.7.6002.23711\"))){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n\nif(hotfix_check_sp(win2008r2:2) > 0)\n{\n if((version_in_range(version:dllVer, test_version:\"5.8.7601.10000\", test_version2:\"5.8.7601.18877\")) ||\n (version_in_range(version:dllVer, test_version:\"5.8.7601.23000\", test_version2:\"5.8.7601.23080\"))){\n security_message( port: 0, data: \"The target host was found to be vulnerable\" );\n }\n exit(0);\n}\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2023-05-31T14:26:44", "description": "The version of Internet Explorer installed on the remote host is missing Cumulative Security Update 3076321. It is, therefore, affected by multiple vulnerabilities, the majority of which are remote code execution vulnerabilities. An attacker can exploit these vulnerabilities by convincing a user to visit a specially crafted website.\n\nHosts running Internet Explorer 10 or Internet Explorer 11 will not be fully protected until both security update 3065822 and security update 3075516 are applied to the system. Security update 3075516 may require manual installation depending on your patching method.\n\nNote that the majority of the vulnerabilities addressed by Cumulative Security Update 3076321 are mitigated by the Enhanced Security Configuration (ESC) mode which is enabled by default on Windows Server 2003, 2008, 2008 R2, 2012, and 2012 R2.", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "nessus", "title": "MS15-065: Cumulative Security Update for Internet Explorer (3076321)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-1729", "CVE-2015-1733", "CVE-2015-1738", "CVE-2015-1767", "CVE-2015-2372", "CVE-2015-2383", "CVE-2015-2384", "CVE-2015-2385", "CVE-2015-2388", "CVE-2015-2389", "CVE-2015-2390", "CVE-2015-2391", "CVE-2015-2397", "CVE-2015-2398", "CVE-2015-2401", "CVE-2015-2402", "CVE-2015-2403", "CVE-2015-2404", "CVE-2015-2406", "CVE-2015-2408", "CVE-2015-2410", "CVE-2015-2411", "CVE-2015-2412", "CVE-2015-2413", "CVE-2015-2414", "CVE-2015-2419", "CVE-2015-2421", "CVE-2015-2422", "CVE-2015-2425"], "modified": "2022-05-25T00:00:00", "cpe": ["cpe:/o:microsoft:windows", "cpe:/a:microsoft:ie"], "id": "SMB_NT_MS15-065.NASL", "href": "https://www.tenable.com/plugins/nessus/84761", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(84761);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/25\");\n\n script_cve_id(\n \"CVE-2015-1729\",\n \"CVE-2015-1733\",\n \"CVE-2015-1738\",\n \"CVE-2015-1767\",\n \"CVE-2015-2372\",\n \"CVE-2015-2383\",\n \"CVE-2015-2384\",\n \"CVE-2015-2385\",\n \"CVE-2015-2388\",\n \"CVE-2015-2389\",\n \"CVE-2015-2390\",\n \"CVE-2015-2391\",\n \"CVE-2015-2397\",\n \"CVE-2015-2398\",\n \"CVE-2015-2401\",\n \"CVE-2015-2402\",\n \"CVE-2015-2403\",\n \"CVE-2015-2404\",\n \"CVE-2015-2406\",\n \"CVE-2015-2408\",\n \"CVE-2015-2410\",\n \"CVE-2015-2411\",\n \"CVE-2015-2412\",\n \"CVE-2015-2413\",\n \"CVE-2015-2414\",\n \"CVE-2015-2419\",\n \"CVE-2015-2421\",\n \"CVE-2015-2422\",\n \"CVE-2015-2425\"\n );\n script_bugtraq_id(\n 75626,\n 75631,\n 75636,\n 75677,\n 75679,\n 75687,\n 75689,\n 75690,\n 75745\n );\n script_xref(name:\"MSFT\", value:\"MS15-065\");\n script_xref(name:\"MSKB\", value:\"3065822\");\n script_xref(name:\"MSKB\", value:\"3075516\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/04/18\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/06/15\");\n\n script_name(english:\"MS15-065: Cumulative Security Update for Internet Explorer (3076321)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has a web browser installed that is affected by\nmultiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Internet Explorer installed on the remote host is\nmissing Cumulative Security Update 3076321. It is, therefore, affected\nby multiple vulnerabilities, the majority of which are remote code\nexecution vulnerabilities. An attacker can exploit these\nvulnerabilities by convincing a user to visit a specially crafted\nwebsite.\n\nHosts running Internet Explorer 10 or Internet Explorer 11 will not\nbe fully protected until both security update 3065822 and security\nupdate 3075516 are applied to the system. Security update 3075516\nmay require manual installation depending on your patching method.\n\nNote that the majority of the vulnerabilities addressed by Cumulative\nSecurity Update 3076321 are mitigated by the Enhanced Security\nConfiguration (ESC) mode which is enabled by default on Windows Server\n2003, 2008, 2008 R2, 2012, and 2012 R2.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-065\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Internet Explorer 6, 7, 8,\n9, 10, and 11.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-2425\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:ie\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2022 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-065';\nkb = '3065822';\nkb2 = '3075516';\n\nkbs = make_list(kb,kb2);\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\n# Some of the 2k3 checks could flag XP 64, which is unsupported\nif (\"Windows XP\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\nif (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);\n\nshare = hotfix_get_systemdrive(exit_on_fail:TRUE, as_share:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nvuln = 0;\n\nif (\n #######################################\n # KB 3076321 (kb) #\n #######################################\n\n # Windows 8.1 / 2012 R2\n #\n # - Internet Explorer 11\n hotfix_is_vulnerable(os:\"6.3\", file:\"Mshtml.dll\", version:\"11.0.9600.17905\", min_version:\"11.0.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 8 / 2012\n #\n # - Internet Explorer 10\n hotfix_is_vulnerable(os:\"6.2\", file:\"Mshtml.dll\", version:\"10.0.9200.17412\", min_version:\"10.0.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.2\", file:\"Mshtml.dll\", version:\"10.0.9200.21523\", min_version:\"10.0.9200.21000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 7 / 2008 R2\n # - Internet Explorer 11\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"11.0.9600.17915\", min_version:\"11.0.9600.17000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 10\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"10.0.9200.17412\", min_version:\"10.0.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"10.0.9200.21523\", min_version:\"10.0.9200.21000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 9\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"9.0.8112.16669\", min_version:\"9.0.8112.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"9.0.8112.20784\", min_version:\"9.0.8112.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"8.0.7601.18896\", min_version:\"8.0.7601.17000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Mshtml.dll\", version:\"8.0.7601.23099\", min_version:\"8.0.7601.22000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / 2008\n #\n # - Internet Explorer 9\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"9.0.8112.16669\", min_version:\"9.0.8112.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"9.0.8112.20784\", min_version:\"9.0.8112.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"8.0.6001.19652\", min_version:\"8.0.6001.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"8.0.6001.23707\", min_version:\"8.0.6001.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 7\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6002.19421\", min_version:\"7.0.6002.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6002.23728\", min_version:\"7.0.6002.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 2003\n #\n # - Internet Explorer 8\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"8.0.6001.23707\", min_version:\"8.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 7\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"7.0.6000.21481\", min_version:\"7.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n # - Internet Explorer 6\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Mshtml.dll\", version:\"6.0.3790.5662\", min_version:\"6.0.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n) vuln++;\n\n\n\nif (\n #######################################\n # KB 3075516 (kb2) #\n #######################################\n\n # Windows 8.1 / 2012 R2\n #\n # - Internet Explorer 11\n hotfix_is_vulnerable(os:\"6.3\", file:\"jscript9.dll\", version:\"11.0.9600.17923\", min_version:\"11.0.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb2) ||\n\n # Windows 8 / 2012\n #\n # - Internet Explorer 10\n hotfix_is_vulnerable(os:\"6.2\", file:\"jscript9.dll\", version:\"10.0.9200.21531\", min_version:\"10.0.9200.21000\", dir:\"\\system32\", bulletin:bulletin, kb:kb2) ||\n hotfix_is_vulnerable(os:\"6.2\", file:\"jscript9.dll\", version:\"10.0.9200.17422\", min_version:\"10.0.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb2) ||\n\n # Windows 7 / 2008 R2\n # - Internet Explorer 11\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"jscript9.dll\", version:\"11.0.9600.17918\", min_version:\"11.0.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb2) ||\n # - Internet Explorer 10\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"jscript9.dll\", version:\"10.0.9200.21531\", min_version:\"10.0.9200.21000\", dir:\"\\system32\", bulletin:bulletin, kb:kb2) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"jscript9.dll\", version:\"10.0.9200.17422\", min_version:\"10.0.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb2)\n) vuln++;\n\nif( vuln )\n{\n set_kb_item(name:\"SMB/Missing/\"+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:14:56", "description": "The remote Windows host is affected by multiple vulnerabilities :\n\n - Multiple privilege escalation vulnerabilities exist in the Windows kernel-mode driver due to improper handling of objects in memory. A local attacker can exploit these vulnerabilities, with a specially crafted application, to elevate privileges to full administrative rights.\n (CVE-2015-2363, CVE-2015-2365, CVE-2015-2366)\n\n - An information disclosure vulnerability exists in the Windows kernel-mode driver due to improper handling of non-initialized values in memory. An attacker can exploit this vulnerability, with a specially crafted application, to leak memory addresses or other sensitive kernel information that can be used for further exploitation of the system. (CVE-2015-2367)\n\n - An information disclosure vulnerability exists in the Windows kernel-mode driver due to improper handling of private address information during a function call. An attacker can exploit this vulnerability, with a specially crafted application, to request the contents of specific memory addresses. (CVE-2015-2381, CVE-2015-2382)", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2363", "CVE-2015-2365", "CVE-2015-2366", "CVE-2015-2367", "CVE-2015-2381", "CVE-2015-2382"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-073.NASL", "href": "https://www.tenable.com/plugins/nessus/84747", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84747);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/11/15 20:50:31\");\n\n script_cve_id(\n \"CVE-2015-2363\",\n \"CVE-2015-2365\",\n \"CVE-2015-2366\",\n \"CVE-2015-2367\",\n \"CVE-2015-2381\",\n \"CVE-2015-2382\"\n );\n #script_bugtraq_id();\n script_xref(name:\"MSFT\", value:\"MS15-073\");\n script_xref(name:\"MSKB\", value:\"3070102\");\n script_xref(name:\"IAVA\", value:\"2015-A-0162\");\n\n script_name(english:\"MS15-073: Vulnerabilities in Windows Kernel-Mode Driver Could Allow Elevation of Privilege (3070102)\");\n script_summary(english:\"Checks the file version of Win32k.sys.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is affected by multiple vulnerabilities :\n\n - Multiple privilege escalation vulnerabilities exist in\n the Windows kernel-mode driver due to improper handling\n of objects in memory. A local attacker can exploit these\n vulnerabilities, with a specially crafted application,\n to elevate privileges to full administrative rights.\n (CVE-2015-2363, CVE-2015-2365, CVE-2015-2366)\n\n - An information disclosure vulnerability exists in the\n Windows kernel-mode driver due to improper handling of\n non-initialized values in memory. An attacker can\n exploit this vulnerability, with a specially crafted\n application, to leak memory addresses or other sensitive\n kernel information that can be used for further\n exploitation of the system. (CVE-2015-2367)\n\n - An information disclosure vulnerability exists in the\n Windows kernel-mode driver due to improper handling of\n private address information during a function call. An\n attacker can exploit this vulnerability, with a\n specially crafted application, to request the contents\n of specific memory addresses. (CVE-2015-2381,\n CVE-2015-2382)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-073\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2003, Vista, 2008,\n7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, and 2012 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-073';\nkb = '3070102';\n\nkbs = make_list(kb);\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\n# Some of the 2k3 checks could flag XP 64, which is unsupported\nif (\"Windows XP\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Windows 8.1 / Windows Server 2012 R2\n hotfix_is_vulnerable(os:\"6.3\", sp:0, file:\"Win32k.sys\", version:\"6.3.9600.17915\", min_version:\"6.3.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 8 / Windows Server 2012\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"Win32k.sys\", version:\"6.2.9200.21528\", min_version:\"6.2.9200.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"Win32k.sys\", version:\"6.2.9200.17419\", min_version:\"6.2.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 7 / Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Win32k.sys\", version:\"6.1.7601.23109\", min_version:\"6.1.7601.22000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Win32k.sys\", version:\"6.1.7601.18906\", min_version:\"6.1.7600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / Windows Server 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Win32k.sys\", version:\"6.0.6002.23735\", min_version:\"6.0.6002.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Win32k.sys\", version:\"6.0.6002.19429\", min_version:\"6.0.6001.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows Server 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Win32k.sys\", version:\"5.2.3790.5667\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:15:42", "description": "The remote Windows host is affected by multiple remote code execution vulnerabilities in Hyper-V :\n\n - An error exists in how Hyper-V handles packet size memory initialization in guest virtual machines. An authenticated attacker with access to a guest virtual machine can exploit this by running a specially crafted application to execute arbitrary code in a host context.\n (CVE-2015-2361)\n\n - An error exists in how Hyper-V initializes system data structures in guest virtual machines. An authenticated attacker with access to a guest virtual machine can exploit this by running a specially crafted application to execute arbitrary code in a host context.\n (CVE-2015-2362)", "cvss3": {}, "published": "2015-07-15T00:00:00", "type": "nessus", "title": "MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2361", "CVE-2015-2362"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-068.NASL", "href": "https://www.tenable.com/plugins/nessus/84762", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84762);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2018/11/15 20:50:31\");\n\n script_cve_id(\"CVE-2015-2361\", \"CVE-2015-2362\");\n script_xref(name:\"MSFT\", value:\"MS15-068\");\n script_xref(name:\"MSKB\", value:\"3046339\");\n script_xref(name:\"MSKB\", value:\"3046359\");\n script_xref(name:\"IAVB\", value:\"2015-B-0091\");\n\n script_name(english:\"MS15-068: Vulnerabilities in Windows Hyper-V Could Allow Remote Code Execution (3072000)\");\n script_summary(english:\"Checks the version of storvsp.sys or vmicvss.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple remote code execution\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is affected by multiple remote code execution\nvulnerabilities in Hyper-V :\n\n - An error exists in how Hyper-V handles packet size\n memory initialization in guest virtual machines. An\n authenticated attacker with access to a guest virtual\n machine can exploit this by running a specially crafted\n application to execute arbitrary code in a host context.\n (CVE-2015-2361)\n\n - An error exists in how Hyper-V initializes system data\n structures in guest virtual machines. An authenticated\n attacker with access to a guest virtual machine can\n exploit this by running a specially crafted application\n to execute arbitrary code in a host context.\n (CVE-2015-2362)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-068\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2008, 2008 R2, 8,\n2012, 8.1, and 2012 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"wmi_enum_server_features.nbin\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, 'Host/patch_management_checks');\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS15-068';\nkb = '3046339';\nkb2 = '3046359';\nvuln = 0;\n\nkbs = make_list(kb, kb2);\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2', win7:'1', win8:'0', win81:'0') <= 0)\n audit(AUDIT_OS_SP_NOT_VULN);\n\n# Not embedded, Vista, Win7\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\n \"Windows Embedded\" >< productname ||\n \"Vista\" >< productname ||\n \"Windows 7\" >< productname\n) exit(0, \"The host is running \"+productname+\" and hence is not affected.\");\n\n# (Hyper-V ID = 20)\nif (!get_kb_item('WMI/server_feature/20'))\n{\n # could not determine if Hyper-V was enabled via wmi, so now check with registry\n # This is the key for the version of the integration services installer files,\n # which are only on the Hyper-V host.\n # Connect to remote registry.\n registry_init();\n hklm = registry_hive_connect(hive:HKEY_LOCAL_MACHINE, exit_on_fail:TRUE);\n hyperv_reg = get_registry_value(handle:hklm, item:\"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Virtualization\\GuestInstaller\\Version\\Microsoft-Hyper-V-Guest-Installer\");\n RegCloseKey(handle:hklm);\n close_registry(close:FALSE);\n}\nelse hyperv_reg = TRUE;\n\nsystemroot = hotfix_get_systemroot();\nif (!systemroot) audit(AUDIT_PATH_NOT_DETERMINED, 'system root');\n\nshare = hotfix_path2share(path:systemroot);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\n####################################\n# KB 3046359 ( storvsp.sys )\n####################################\nif (\n # Windows 8.1 / Windows Server 2012 R2\n hotfix_is_vulnerable(os:\"6.3\", sp:0, arch:\"x64\", file:\"storvsp.sys\", version:\"6.3.9600.17723\", min_version:\"6.3.9600.16000\", dir:\"\\system32\\drivers\", bulletin:bulletin, kb:kb2)\n)\n{\n vuln++;\n}\nNetUseDel(close:FALSE);\n\n####################################\n# KB 3046339 ( vmicvss.dll )\n# SxS\n####################################\n\nlogin = kb_smb_login();\npass = kb_smb_password();\ndomain = kb_smb_domain();\n\nif (hyperv_reg)\n{\n winsxs = ereg_replace(pattern:'^[A-Za-z]:(.*)', replace:\"\\1\\WinSxS\", string:systemroot);\n winsxs_share = hotfix_path2share(path:systemroot);\n rc = NetUseAdd(login:login, password:pass, domain:domain, share:winsxs_share);\n if (rc != 1)\n {\n NetUseDel();\n audit(AUDIT_SHARE_FAIL, winsxs_share);\n }\n\n files = list_dir(basedir:winsxs, level:0, dir_pat:\"amd64_microsoft-hyper-v-i\", file_pat:\"^vmicvss\\.dll$\", max_recurse:1);\n if (\n # Windows 8.1 / Windows Server 2012 R2\n hotfix_check_winsxs(os:'6.3', sp:0, arch:\"x64\", files:files, versions:make_list('6.3.9600.17723'), max_versions:make_list('6.3.9600.99999'), bulletin:bulletin, kb:kb) ||\n\n # Windows 8 64bit / Windows Server 2012\n hotfix_check_winsxs(os:'6.2', sp:0, arch:\"x64\", files:files, versions:make_list('6.2.9200.21473'), max_versions:make_list('6.2.9200.99999'), bulletin:bulletin, kb:kb) ||\n hotfix_check_winsxs(os:'6.2', sp:0, arch:\"x64\", files:files, versions:make_list('6.2.9200.17361'), max_versions:make_list('6.2.9200.19999'), bulletin:bulletin, kb:kb) ||\n\n # Server 2008 R2\n hotfix_check_winsxs(os:'6.1', sp:1, arch:\"x64\", files:files, versions:make_list('6.1.7601.23045'), max_versions:make_list('6.1.7601.99999'), bulletin:bulletin, kb:kb) ||\n hotfix_check_winsxs(os:'6.1', sp:1, arch:\"x64\", files:files, versions:make_list('6.1.7601.18844'), max_versions:make_list('6.1.7601.21999'), bulletin:bulletin, kb:kb) ||\n\n # Server 2008\n hotfix_check_winsxs(os:'6.0', sp:2, arch:\"x64\", files:files, versions:make_list('6.0.6002.23684'), max_versions:make_list('6.0.6002.99999'), bulletin:bulletin, kb:kb) ||\n hotfix_check_winsxs(os:'6.0', sp:2, arch:\"x64\", files:files, versions:make_list('6.0.6002.19378'), max_versions:make_list('6.1.7601.21999'), bulletin:bulletin, kb:kb)\n )\n {\n vuln++;\n }\n}\n\nif (vuln)\n{\n set_kb_item(name:\"SMB/Missing/\"+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n if (!hyperv_reg)\n audit(AUDIT_HOST_NOT, 'affected (and Hyper-V was not detected)');\n else\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:15:09", "description": "The remote Windows host is affected by multiple remote code execution vulnerabilities :\n\n - A remote code execution vulnerability exists due to improper handling of the loading of dynamic link library (DLL) files. A remote attacker can exploit this vulnerability by placing a specially crafted DLL file in a user's current working directory and then convincing the user to launch a program designed to load the DLL, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-2368)\n\n - A remote code execution vulnerability exists in Microsoft Windows Media Device Manager due to improper handling of the loading of dynamic link library (DLL) files. A remote attacker can exploit this vulnerability by placing a specially crafted DLL file in a user's current working directory and then convincing the user to open a specially crafted .RTF file, resulting in the execution of arbitrary code in the context of the current user. (CVE-2015-2369)", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution (3072631)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2368", "CVE-2015-2369"], "modified": "2020-12-04T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-069.NASL", "href": "https://www.tenable.com/plugins/nessus/84734", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84734);\n script_version(\"1.17\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/04\");\n\n script_cve_id(\"CVE-2015-2368\", \"CVE-2015-2369\");\n script_xref(name:\"MSFT\", value:\"MS15-069\");\n script_xref(name:\"MSKB\", value:\"3072631\");\n script_xref(name:\"MSKB\", value:\"3067903\");\n script_xref(name:\"MSKB\", value:\"3070738\");\n script_xref(name:\"MSKB\", value:\"3061512\");\n script_xref(name:\"IAVA\", value:\"2015-A-0167\");\n\n script_name(english:\"MS15-069: Vulnerabilities in Windows Could Allow Remote Code Execution (3072631)\");\n script_summary(english:\"Checks the file version of cewmdm.dll, wcewmdm.dll, mstscax.dll, or atlthunk.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple remote code execution\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is affected by multiple remote code execution\nvulnerabilities :\n\n - A remote code execution vulnerability exists due to\n improper handling of the loading of dynamic link library\n (DLL) files. A remote attacker can exploit this\n vulnerability by placing a specially crafted DLL file in\n a user's current working directory and then convincing\n the user to launch a program designed to load the DLL,\n resulting in the execution of arbitrary code in the\n context of the current user. (CVE-2015-2368)\n\n - A remote code execution vulnerability exists in\n Microsoft Windows Media Device Manager due to improper\n handling of the loading of dynamic link library (DLL)\n files. A remote attacker can exploit this vulnerability\n by placing a specially crafted DLL file in a user's\n current working directory and then convincing the user\n to open a specially crafted .RTF file, resulting in the\n execution of arbitrary code in the context of the\n current user. (CVE-2015-2369)\");\n # https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-069\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6aac26fe\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2003, Vista, 2008,\n7, 2008 R2, 8.1, and 2012 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-2369\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\", \"wmi_enum_qfes.nbin\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-069';\n\nkbs = make_list('3072631', '3067903', '3070738', '3061512');\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nos = get_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\nif (hotfix_check_server_core() == 1) audit(AUDIT_WIN_SERVER_CORE);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\n# Some of the 2k3 checks could flag XP 64, which is unsupported\nif (\"Windows XP\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nvuln = 0;\n\n#############\n#\n# KB 3061512\n#\n#############\nkb = '3061512';\nif (os == '6.3')\n{\n sp = get_kb_item(\"SMB/CSDVersion\");\n if (sp)\n {\n sp = ereg_replace(pattern:\".*Service Pack ([0-9]).*\", string:sp, replace:\"\\1\");\n sp = int(sp);\n }\n else sp = 0;\n\n if (sp == 0)\n {\n qfe_installed = get_kb_item(\"WMI/Installed/Hotfix/KB3061512\");\n if(isnull(qfe_installed))\n {\n registry_init();\n hklm = registry_hive_connect(hive:HKEY_LOCAL_MACHINE, exit_on_fail:TRUE);\n\n key = \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\SideBySide\\Winners\\x86_microsoft-windows-atlthunk_31bf3856ad364e35_none_4da81b30e32b69f5\\6.3\\\";\n value = get_registry_value(handle:hklm, item:key);\n if(isnull(value) || (ver_compare(ver:value, fix:'6.3.9600.17898', strict:FALSE) < 0))\n {\n RegCloseKey(handle:hklm);\n close_registry();\n hotfix_add_report('\\n The remote host is missing KB3061512.\\n', bulletin:bulletin, kb:kb);\n vuln++;\n }\n else\n {\n RegCloseKey(handle:hklm);\n close_registry();\n }\n }\n }\n}\n\n#############\n#\n# KB 3067903\n#\n#############\nkb = '3067903';\nif (\n # Windows 7 / Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"cewmdm.dll\", version:\"12.0.7601.23075\", min_version:\"12.0.7601.22000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"cewmdm.dll\", version:\"12.0.7601.18872\", min_version:\"12.0.7600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / Windows Server 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"cewmdm.dll\", version:\"11.0.6002.23710\", min_version:\"11.0.6002.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"cewmdm.dll\", version:\"11.0.6002.19403\", min_version:\"11.0.6001.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n) vuln++;\n\n\n#############\n#\n# KB 3070738\n#\n#############\nkb = '3070738';\nif (\n # Windows 7 / Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"mstscax.dll\", version:\"6.3.9600.17901\", min_version:\"6.3.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n) vuln++;\n\nif (vuln)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:14:44", "description": "Multiple elevation of privilege vulnerabilities exist in Microsoft Windows OLE due to a failure to properly validate user input. An attacker can exploit these, in conjunction with other vulnerabilities, to execute arbitrary code on an affected system with the permissions of the current user.", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2416", "CVE-2015-2417"], "modified": "2019-11-22T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-075.NASL", "href": "https://www.tenable.com/plugins/nessus/84741", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84741);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\"CVE-2015-2416\", \"CVE-2015-2417\");\n script_xref(name:\"MSFT\", value:\"MS15-075\");\n script_xref(name:\"MSKB\", value:\"3072633\");\n script_xref(name:\"IAVA\", value:\"2015-A-0169\");\n\n script_name(english:\"MS15-075: Vulnerabilities in OLE Could Allow Elevation of Privilege (3072633)\");\n script_summary(english:\"Checks the file version of ole32.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple elevation of privilege\nvulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"Multiple elevation of privilege vulnerabilities exist in Microsoft\nWindows OLE due to a failure to properly validate user input. An\nattacker can exploit these, in conjunction with other vulnerabilities,\nto execute arbitrary code on an affected system with the permissions\nof the current user.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-075\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2003, Vista, 2008,\n7, 2008 R2, 8, 2012, 8.1, and 2012 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-2417\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-075';\nkb = '3072633';\n\nkbs = make_list(kb);\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\n# Some of the 2k3 checks could flag XP 64, which is unsupported\nif (\"Windows XP\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Windows 8.1 / Windows Server 2012 R2\n hotfix_is_vulnerable(os:\"6.3\", sp:0, file:\"ole32.dll\", version:\"6.3.9600.17905\", min_version:\"6.3.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 8 / Windows Server 2012\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"ole32.dll\", version:\"6.2.9200.21524\", min_version:\"6.2.9200.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"ole32.dll\", version:\"6.2.9200.17414\", min_version:\"6.2.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 7 / Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"ole32.dll\", version:\"6.1.7601.23118\", min_version:\"6.1.7601.22000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"ole32.dll\", version:\"6.1.7601.18915\", min_version:\"6.1.7600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / Windows Server 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"ole32.dll\", version:\"6.0.6002.23743\", min_version:\"6.0.6002.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"ole32.dll\", version:\"6.0.6002.19435\", min_version:\"6.0.6001.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows Server 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"ole32.dll\", version:\"5.2.3790.5663\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:15:40", "description": "The remote Windows host is affected by a privilege escalation vulnerability in the Adobe Type Manager Font Driver (ATMFD) due to a failure to properly handle objects in memory. A local attacker can exploit this by running a specially crafted application, resulting in arbitrary code execution with elevated privileges.", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2387"], "modified": "2022-03-08T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-077.NASL", "href": "https://www.tenable.com/plugins/nessus/84746", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(84746);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/03/08\");\n\n script_cve_id(\"CVE-2015-2387\");\n script_xref(name:\"MSFT\", value:\"MS15-077\");\n script_xref(name:\"MSKB\", value:\"3077657\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/03/24\");\n\n script_name(english:\"MS15-077: Vulnerability in ATM Font Driver Could Allow Elevation of Privilege (3077657)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Adobe Font driver on the remote host is affected by a privilege\nescalation vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is affected by a privilege escalation\nvulnerability in the Adobe Type Manager Font Driver (ATMFD) due to a\nfailure to properly handle objects in memory. A local attacker can\nexploit this by running a specially crafted application, resulting in\narbitrary code execution with elevated privileges.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://twitter.com/hackerfantastic/status/618104999785156608\");\n # https://blog.trendmicro.com/trendlabs-security-intelligence/a-look-at-the-open-type-font-manager-vulnerability-from-the-hacking-team-leak/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?f3f38e4f\");\n script_set_attribute(attribute:\"see_also\", value:\"https://code.google.com/p/google-security-research/issues/detail?id=473\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-077\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2003, Vista, 2008,\n7, 2008 R2, 8, RT, 2012, 8.1, RT 8.1, and 2012 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-2387\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_canvas\", value:\"true\");\n script_set_attribute(attribute:\"canvas_package\", value:\"CANVAS\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2022 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS15-077';\nkb = '3077657';\n\nkbs = make_list(kb);\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Some of the 2k3 checks could flag XP 64, which is unsupported\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows XP\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(exit_on_fail:TRUE, as_share:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Windows 8.1 / Windows Server 2012 R2\n hotfix_is_vulnerable(os:\"6.3\", sp:0, file:\"atmfd.dll\", version:\"5.1.2.242\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 8 / Windows Server 2012\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"atmfd.dll\", version:\"5.1.2.242\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 7 and Windows Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"atmfd.dll\", version:\"5.1.2.242\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / Windows 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"atmfd.dll\", version:\"5.1.2.242\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"atmfd.dll\", version:\"5.2.2.242\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:15:36", "description": "The remote Windows host is affected by a privilege escalation vulnerability in the Microsoft Remote Procedure Call (RPC) due to incorrectly allowing DCE/RPC connection reflection. A remote, authenticated attacker can exploit this vulnerability, with a specially crafted application, to elevate privileges.\n\nNote that in order to exploit this issue, an attacker would first have to log onto the system.", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2370"], "modified": "2019-11-22T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-076.NASL", "href": "https://www.tenable.com/plugins/nessus/84748", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84748);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\"CVE-2015-2370\");\n script_xref(name:\"MSFT\", value:\"MS15-076\");\n script_xref(name:\"MSKB\", value:\"3067505\");\n script_xref(name:\"IAVA\", value:\"2015-A-0165\");\n\n script_name(english:\"MS15-076: Vulnerability in Windows Remote Procedure Call Could Allow Elevation of Privilege (3067505)\");\n script_summary(english:\"Checks the version of rpcrt4.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by a privilege escalation\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is affected by a privilege escalation\nvulnerability in the Microsoft Remote Procedure Call (RPC) due to\nincorrectly allowing DCE/RPC connection reflection. A remote,\nauthenticated attacker can exploit this vulnerability, with a\nspecially crafted application, to elevate privileges.\n\nNote that in order to exploit this issue, an attacker would first have\nto log onto the system.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-076\");\n script_set_attribute(attribute:\"see_also\", value:\"https://code.google.com/p/google-security-research/issues/detail?id=325\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2003, Vista, 2008,\n7, 2008 R2, 8, 2012, 8.1, and 2012 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-2370\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-076';\n\nkb = \"3067505\";\nkbs = make_list(kb);\n\nif (get_kb_item(\"Host/patch_management_checks\"))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0)\n audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(exit_on_fail:TRUE, as_share:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\n# The 2k3 checks could flag XP 64, which is unsupported\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\nif (\"Windows XP\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nif (\n # Windows 8.1 / 2012 R2\n hotfix_is_vulnerable(os:\"6.3\", file:\"Rpcrt4.dll\", version:\"6.3.9600.17919\", min_version:\"6.3.9600.15000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 8 / 2012\n hotfix_is_vulnerable(os:\"6.2\", file:\"Rpcrt4.dll\", version:\"6.2.9200.21531\", min_version:\"6.2.9200.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.2\", file:\"Rpcrt4.dll\", version:\"6.2.9200.17422\", min_version:\"6.2.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 7 / 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Rpcrt4.dll\", version:\"6.1.7601.23112\", min_version:\"6.1.7601.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Rpcrt4.dll\", version:\"6.1.7601.18909\", min_version:\"6.1.7600.17000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Rpcrt4.dll\", version:\"6.0.6002.23737\", min_version:\"6.0.6002.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Rpcrt4.dll\", version:\"6.0.6002.19431\", min_version:\"6.0.6002.10000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Rpcrt4.dll\", version:\"5.2.3790.5669\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n\n)\n{\n set_kb_item(name:\"SMB/Missing/\"+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:15:40", "description": "The remote Windows host is affected by a privilege escalation vulnerability due to improper processing of bitmap conversions in the Windows graphics component. An authenticated attacker can exploit this, via a specially crafted application, to gain administrative privileges.", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2364"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-072.NASL", "href": "https://www.tenable.com/plugins/nessus/84744", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84744);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2018/11/15 20:50:31\");\n\n script_cve_id(\"CVE-2015-2364\");\n script_xref(name:\"MSFT\", value:\"MS15-072\");\n script_xref(name:\"MSKB\", value:\"3069392\");\n\n script_name(english:\"MS15-072: Vulnerability in Windows Graphics Component Could Allow Elevation of Privilege (3069392)\");\n script_summary(english:\"Checks the file version of gdi32.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by a privilege escalation\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is affected by a privilege escalation\nvulnerability due to improper processing of bitmap conversions in the\nWindows graphics component. An authenticated attacker can exploit\nthis, via a specially crafted application, to gain administrative\nprivileges.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-072\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2003, Vista, 2008,\n7, 2008 R2, 8, 2012, 8.1, and 2012 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-072';\nkb = '3069392';\n\nkbs = make_list(kb);\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\n# Some of the 2k3 checks could flag XP 64, which is unsupported\nif (\"Windows XP\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Windows 8.1 / Windows Server 2012 R2\n hotfix_is_vulnerable(os:\"6.3\", sp:0, file:\"gdi32.dll\", version:\"6.3.9600.17902\", min_version:\"6.3.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 8 / Windows Server 2012\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"gdi32.dll\", version:\"6.2.9200.21521\", min_version:\"6.2.9200.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"gdi32.dll\", version:\"6.2.9200.17410\", min_version:\"6.2.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 7 / Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"gdi32.dll\", version:\"6.1.7601.23100\", min_version:\"6.1.7601.22000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"gdi32.dll\", version:\"6.1.7601.18898\", min_version:\"6.1.7600.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / Windows Server 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"gdi32.dll\", version:\"6.0.6002.23728\", min_version:\"6.0.6002.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"gdi32.dll\", version:\"6.0.6002.19421\", min_version:\"6.0.6001.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows Server 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"gdi32.dll\", version:\"5.2.3790.5661\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:15:09", "description": "The version of Windows Installer Service installed on the remote Windows host is missing Cumulative Security Update 3072630. It is, therefore, affected by an elevation of privilege vulnerability in the Windows Installer service due to improperly running customized action scripts. A local attacker, using specially crafted code that gets executed by a vulnerable .msi package, can exploit this vulnerability to gain elevated privileges.", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2371"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-074.NASL", "href": "https://www.tenable.com/plugins/nessus/84745", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84745);\n script_version(\"1.10\");\n script_cvs_date(\"Date: 2018/11/15 20:50:31\");\n\n script_cve_id(\"CVE-2015-2371\");\n script_xref(name:\"MSFT\", value:\"MS15-074\");\n script_xref(name:\"MSKB\", value:\"3072630\");\n\n script_name(english:\"MS15-074: Vulnerability in Windows Installer Service Could Allow Elevation of Privilege (3072630)\");\n script_summary(english:\"Checks the version of msi.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by a privilege escalation\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Windows Installer Service installed on the remote\nWindows host is missing Cumulative Security Update 3072630. It is,\ntherefore, affected by an elevation of privilege vulnerability in the\nWindows Installer service due to improperly running customized action\nscripts. A local attacker, using specially crafted code that gets\nexecuted by a vulnerable .msi package, can exploit this vulnerability\nto gain elevated privileges.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-074\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for 2003, Vista, 2008, 7, 2008\nR2, 8, 2012, 8.1, 2012 R2, and 10.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/03/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-074';\nkb = '3072630';\nkbs = make_list(kb);\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0', win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Windows 10\n hotfix_is_vulnerable(os:\"10\", sp:0, file:\"msi.dll\", version:\"5.0.10240.16386\", min_version:\"5.0.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 8.1 / Windows Server 2012 R2 with KB3072630 applied\n hotfix_is_vulnerable(os:\"6.3\", sp:0, file:\"msi.dll\", version:\"5.0.9600.17905\", min_version:\"5.0.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 8 / Windows Server 2012\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"msi.dll\", version:\"5.0.9200.21523\", min_version:\"5.0.9200.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"msi.dll\", version:\"5.0.9200.17412\", min_version:\"5.0.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 7 / Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"msi.dll\", version:\"5.0.7601.23099\", min_version:\"5.0.7601.22000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"msi.dll\", version:\"5.0.7601.18896\", min_version:\"5.0.7600.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Vista / Windows Server 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"msi.dll\", version:\"4.5.6002.23730\", min_version:\"4.5.6002.23000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"msi.dll\", version:\"4.5.6002.19424\", min_version:\"4.5.6002.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"msi.dll\", version:\"4.5.6002.23731\", dir:\"\\System32\", bulletin:bulletin, kb:kb)\n)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:15:09", "description": "The remote Windows host is affected by a privilege escalation vulnerability due to the Netlogon service improperly establishing a communications channel to a primary domain controller (PDC). An attacker, with access to the PDC, can exploit this by using a crafted application to create a secure channel to the PDC as a backup domain controller (BDC), possibly allowing access to sensitive credential information.\n\nNote that this vulnerability only affects a server if it is configured as a domain controller.", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-071: Vulnerability in NETLOGON Could Allow Elevation of Privilege (3068457)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2374"], "modified": "2019-11-22T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-071.NASL", "href": "https://www.tenable.com/plugins/nessus/84735", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84735);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/11/22\");\n\n script_cve_id(\"CVE-2015-2374\");\n script_bugtraq_id(75633);\n script_xref(name:\"MSFT\", value:\"MS15-071\");\n script_xref(name:\"MSKB\", value:\"3068457\");\n script_xref(name:\"IAVA\", value:\"2015-A-0173\");\n\n script_name(english:\"MS15-071: Vulnerability in NETLOGON Could Allow Elevation of Privilege (3068457)\");\n script_summary(english:\"Checks the version of Netlogon.dll\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by a privilege escalation\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is affected by a privilege escalation\nvulnerability due to the Netlogon service improperly establishing a\ncommunications channel to a primary domain controller (PDC). An\nattacker, with access to the PDC, can exploit this by using a crafted\napplication to create a secure channel to the PDC as a backup domain\ncontroller (BDC), possibly allowing access to sensitive credential\ninformation.\n\nNote that this vulnerability only affects a server if it is configured\nas a domain controller.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-071\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2003, 2008, 2008\nR2, 2012, and 2012 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2015-2374\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"smb_reg_query.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-071';\nkb = \"3068457\";\n\nkbs = make_list(kb);\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_NOTE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\nif (\"Server\" >!< productname) audit(AUDIT_OS_SP_NOT_VULN); # non-server OSes are not affected\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\n# Unless paranoid, check if the server is a DC\nif (report_paranoia < 2)\n{\n registry_init();\n hklm = registry_hive_connect(hive:HKEY_LOCAL_MACHINE, exit_on_fail:TRUE);\n res = get_registry_value(handle:hklm, item:\"SYSTEM\\CurrentControlSet\\Control\\ProductOptions\\ProductType\");\n RegCloseKey(handle:hklm);\n if (res != 'LanmanNT')\n {\n close_registry();\n audit(AUDIT_HOST_NOT, 'configured as a domain controller');\n }\n\n NetUseDel(close:FALSE);\n}\n\nif (\n # Windows Server 2012 R2\n hotfix_is_vulnerable(os:\"6.3\", sp:0, file:\"netlogon.dll\", version:\"6.3.9600.17901\", min_version:\"6.3.9600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows Server 2012\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"netlogon.dll\", version:\"6.2.9200.21506\", min_version:\"6.2.9200.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"netlogon.dll\", version:\"6.2.9200.17395\", min_version:\"6.2.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"netlogon.dll\", version:\"6.1.7601.23083\", min_version:\"6.1.7601.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"netlogon.dll\", version:\"6.1.7601.18880\", min_version:\"6.1.7600.16000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows Server 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"netlogon.dll\", version:\"6.0.6002.23716\", min_version:\"6.0.6002.20000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"netlogon.dll\", version:\"6.0.6002.19409\", min_version:\"6.0.6002.18000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n\n # Windows Server 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"netlogon.dll\", version:\"5.2.3790.5648\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_note();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-06-25T14:39:21", "description": "The remote Windows host is affected by a remote code execution vulnerability due to improper handling of packets by the Remote Desktop Protocol (RDP) service. A remote attacker can exploit this, by sending a specially crafted sequence of packets to the remote RDP server, to execute arbitrary code.", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-067: Vulnerability in RDP Could Allow Remote Code Execution (3073094)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2373"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-067.NASL", "href": "https://www.tenable.com/plugins/nessus/84743", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(84743);\n script_version(\"1.9\");\n script_cvs_date(\"Date: 2018/11/15 20:50:31\");\n\n script_cve_id(\"CVE-2015-2373\");\n script_xref(name:\"MSFT\", value:\"MS15-067\");\n script_xref(name:\"MSKB\", value:\"3073094\");\n script_xref(name:\"MSKB\", value:\"3069762\");\n\n script_name(english:\"MS15-067: Vulnerability in RDP Could Allow Remote Code Execution (3073094)\");\n script_summary(english:\"Checks the version of rdpcorets.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by a remote code execution\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is affected by a remote code execution\nvulnerability due to improper handling of packets by the Remote\nDesktop Protocol (RDP) service. A remote attacker can exploit this,\nby sending a specially crafted sequence of packets to the remote RDP\nserver, to execute arbitrary code.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-067\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 7, 8, and 2012.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-067';\n\nkbs = make_list(\"3073094\", \"3069762\");\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1', win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n# Windows 2008 R2 is not affected, but Windows 7 is\nif (\"Server 2008 R2\" >< productname || \"Small Business Server 2011\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n # Windows 8 / Windows Server 2012\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"rdpcorets.dll\", version:\"6.2.9200.21506\", min_version:\"6.2.9200.20000\", dir:\"\\system32\", bulletin:bulletin, kb:\"3067904\") ||\n hotfix_is_vulnerable(os:\"6.2\", sp:0, file:\"rdpcorets.dll\", version:\"6.2.9200.17395\", min_version:\"6.2.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:\"3067904\") ||\n\n # Windows 7\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"rdpcorets.dll\", version:\"6.1.7601.23095\", min_version:\"6.1.7601.20000\", dir:\"\\system32\", bulletin:bulletin, kb:\"3067904\") ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"rdpcorets.dll\", version:\"6.1.7601.18892\", min_version:\"6.1.7600.18000\", dir:\"\\system32\", bulletin:bulletin, kb:\"3067904\") ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"rdpcorets.dll\", version:\"6.2.9200.21506\", min_version:\"6.2.9200.20000\", dir:\"\\system32\", bulletin:bulletin, kb:\"3069762\") ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"rdpcorets.dll\", version:\"6.2.9200.17395\", min_version:\"6.2.9200.16000\", dir:\"\\system32\", bulletin:bulletin, kb:\"3069762\")\n)\n{\n set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T14:15:40", "description": "The VBScript scripting engine on the remote host is affected by a remote code execution vulnerability due to improper handling of objects in memory. A remote attacker can exploit this vulnerability by convincing a user to visit a specially crafted website or open a specially crafted Microsoft Office document, resulting in the execution of arbitrary code in the context of the current user.", "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "nessus", "title": "MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2015-2372"], "modified": "2018-11-15T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS15-066.NASL", "href": "https://www.tenable.com/plugins/nessus/84736", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(84736);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2018/11/15 20:50:31\");\n\n script_cve_id(\"CVE-2015-2372\");\n script_xref(name:\"MSFT\", value:\"MS15-066\");\n script_xref(name:\"MSKB\", value:\"3068364\");\n script_xref(name:\"MSKB\", value:\"3068368\");\n script_xref(name:\"MSKB\", value:\"3068404\");\n script_xref(name:\"MSKB\", value:\"3072604\");\n\n script_name(english:\"MS15-066: Vulnerability in VBScript Scripting Engine Could Allow Remote Code Execution (3072604)\");\n script_summary(english:\"Checks the version of Vbscript.dll.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by a remote code execution\nvulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The VBScript scripting engine on the remote host is affected by a\nremote code execution vulnerability due to improper handling of\nobjects in memory. A remote attacker can exploit this vulnerability by\nconvincing a user to visit a specially crafted website or open a\nspecially crafted Microsoft Office document, resulting in the\nexecution of arbitrary code in the context of the current user.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-066\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released a set of patches for Windows 2003, Vista, 2008,\nand 2008 R2.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2015/07/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2015/07/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, 'Host/patch_management_checks');\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"smb_hotfixes_fcheck.inc\");\ninclude(\"smb_hotfixes.inc\");\ninclude(\"smb_func.inc\");\ninclude(\"misc_func.inc\");\n\nget_kb_item_or_exit(\"SMB/MS_Bulletin_Checks/Possible\");\n\nbulletin = 'MS15-066';\nkbs = make_list(\n \"3068364\",\n \"3068368\",\n \"3068404\",\n \"3072604\"\n);\n\nif (get_kb_item(\"Host/patch_management_checks\")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit(\"SMB/Registry/Enumerated\");\nget_kb_item_or_exit(\"SMB/WindowsVersion\", exit_code:1);\n\nif (hotfix_check_sp_range(win2003:'2', vista:'2', win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# if IE isn't installed we must still check the vbscript version\nie_ver = get_kb_item(\"SMB/IE/Version\");\nproductname = get_kb_item_or_exit(\"SMB/ProductName\", exit_code:1);\n\n# This bulletin is only for systems without IE installed or with IE 8\n# or lower. MS15-065 is for systems with IE 9 or later installed\nif (!isnull(ie_ver) && (ver_compare(ver:ie_ver, fix:\"9.0.0.0\") >= 0))\naudit(AUDIT_INST_VER_NOT_VULN, \"Internet Explorer\", ie_ver);\n\n# Some of the 2k3 checks could flag XP 64, which is unsupported\nif (\"Windows XP\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nrootfile = hotfix_get_systemroot();\nif (!rootfile) exit(1, \"Failed to get the system root.\");\n\nshare = hotfix_path2share(path:rootfile);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nvuln = 0;\n\n# VBScript 5.8\n# only on Server Core 2008 R2\nkb = \"3068364\";\nif (\n hotfix_check_server_core() == 1 &&\n (\n # Windows Server 2008 R2\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Vbscript.dll\", version:\"5.8.7601.23081\", min_version:\"5.8.7601.22000\", dir:\"\\system32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.1\", sp:1, file:\"Vbscript.dll\", version:\"5.8.7601.18878\", min_version:\"5.8.7601.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n )\n) vuln++;\n\n# VBScript 5.7\nkb = \"3068368\";\nif (\n # Vista / Windows 2008\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Vbscript.dll\", version:\"5.7.6002.23712\", min_version:\"5.7.6002.22000\", dir:\"\\System32\", bulletin:bulletin, kb:kb) ||\n hotfix_is_vulnerable(os:\"6.0\", sp:2, file:\"Vbscript.dll\", version:\"5.7.6002.19405\", min_version:\"5.7.6002.0\", dir:\"\\System32\", bulletin:bulletin, kb:kb) ||\n\n # Windows 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Vbscript.dll\", version:\"5.7.6002.23712\", min_version:\"5.7.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n) vuln++;\n\n# VBScript 5.6\nkb = \"3068404\";\nif (\n # Windows 2003\n hotfix_is_vulnerable(os:\"5.2\", sp:2, file:\"Vbscript.dll\", version:\"5.6.0.8856\", min_version:\"5.6.0.0\", dir:\"\\system32\", bulletin:bulletin, kb:kb)\n) vuln++;\n\nif (vuln)\n{\n set_kb_item(name:\"SMB/Missing/\"+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "mskb": [{"lastseen": "2021-01-01T22:35:53", "description": "<html><body><p>Resolves vulnerabilities in Internet Explorer that could allow remote code execution if a user views a specially crafted webpage.</p><h2>Summary</h2><div class=\"kb-summary-section section\"><span></span>This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about the vulnerabilities, see <a href=\"https://technet.microsoft.com/library/security/ms15-065\" id=\"kb-link-2\" target=\"_self\">Microsoft Security Bulletin MS15-065</a>.<br/><br/></div><h2>How to obtain and install the update</h2><div class=\"kb-summary-section section\"><h3 class=\"sbody-h3\">Method 1: Microsoft Update</h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available through Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see <a href=\"https://www.microsoft.com/security/pc-security/updates.aspx\" id=\"kb-link-3\" target=\"_self\">Get security updates automatically</a>. <br/><br/><span class=\"text-base\">Note</span> For Windows RT and Windows RT 8.1, this update is available only through Microsoft Update.</div><h3 class=\"sbody-h3\">Method 2: Microsoft Download Center</h3>You can obtain the stand-alone update package through the Microsoft Download Center. Go to <a href=\"https://technet.microsoft.com/library/security/ms15-065\" id=\"kb-link-4\" target=\"_self\">Microsoft Security Bulletin MS15-065</a> to find the download links for this update.</div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><h3 class=\"sbody-h3\">Additional information about this security update</h3>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information. If this is the case, the known issue is listed below each article link.<br/><ul class=\"sbody-free_list\"><li><span><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/3065822\" id=\"kb-link-5\">3065822 </a> MS15-065: Description of the security update for Internet Explorer: July 14, 2015 </div></span></li><li><span><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/3074886\" id=\"kb-link-6\">3074886 </a> OneNote app cannot open notebooks, and an ActiveX control cannot be installed in Internet Explorer </div></span></li><li><span><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/3075516\" id=\"kb-link-7\">3075516 </a> MS15-065: Description of the security update for JScript9.dll in Internet Explorer: July 14, 2015 </div></span></li></ul><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Windows Server 2003 (all editions)</h4><h5 class=\"sbody-h5 text-subtitle\">Reference table</h5>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For Internet Explorer 6 for all supported 32-bit editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3065822-x86-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 6 for all supported x64-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3065822-x64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 6 for all supported Itanium-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3065822-ia64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 for all supported 32-bit editions of Windows Server 2003:<br/><span class=\"text-base\">IE7-WindowsServer2003-KB3065822-x86-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 for all supported x64-based editions of Windows Server 2003:<br/><span class=\"text-base\">IE7-WindowsServer2003-KB3065822-x64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 for all supported Itanium-based editions of Windows Server 2003:<br/><span class=\"text-base\">IE7-WindowsServer2003-KB3065822-ia64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 for all supported 32-bit editions of Windows Server 2003:<br/><span class=\"text-base\">IE8-WindowsServer2003-KB3065822-x86-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 for all supported x64-based editions of Windows Server 2003:<br/><span class=\"text-base\">IE8-WindowsServer2003-KB3065822-x64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/262841\" id=\"kb-link-8\" target=\"_self\">Microsoft Knowledge Base Article 262841</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Update log file</span></td><td class=\"sbody-td\">For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003:<br/>KB3065822.log</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003:<br/>KB3065822-IE7.log</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003:<br/>KB3065822-IE8.log</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003:<br/>Use the <span class=\"text-base\">Add or Remove Programs</span> item in Control Panel. Or, use the Spuninst.exe utility that is located in the %Windir%\\$NTUninstallKB3065822$\\Spuninst folder</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003:<br/>Use the <span class=\"text-base\">Add or Remove Programs</span> item in Control Panel. Or, use the Spuninst.exe utility that is located in the %Windir%\\ie7updates\\KB3065822-IE7\\spuninst folder</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003:<br/>Use the <span class=\"text-base\">Add or Remove Programs</span> item in Control Panel. Or, use the Spuninst.exe utility that is located in the %Windir%\\ie8updates\\KB3065822-IE8\\spuninst folder</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a href=\"https://support.microsoft.com/help/3065822 \" id=\"kb-link-9\" target=\"_self\">file information</a> section</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\">For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003:<br/><strong class=\"sbody-strong\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Updates\\Windows Server 2003\\SP3\\KB3065822\\Filelist</strong></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003:<br/><strong class=\"sbody-strong\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Updates\\Windows Server 2003\\SP0\\KB3065822-IE7\\Filelist</strong></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003:<br/><strong class=\"sbody-strong\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Updates\\Windows Server 2003\\SP0\\KB3065822-IE8\\Filelist</strong></td></tr></table></div><h4 class=\"sbody-h4\">Windows Vista (all editions)</h4><h5 class=\"sbody-h5 text-subtitle\">Reference table</h5>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For Internet Explorer 7 in all supported 32-bit editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 in all supported x64-based editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 in all supported 32-bit editions of Windows Vista:<br/><span class=\"text-base\">IE8-Windows6.0-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 in all supported x64-based editions of Windows Vista:<br/><span class=\"text-base\">IE8-Windows6.0-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 9 for all supported 32-bit editions of Windows Vista:<br/><span class=\"text-base\">IE9-Windows6.0-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 9 for all supported x64-based editions of Windows Vista:<br/><span class=\"text-base\">IE9-Windows6.0-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-10\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstall of updates. To uninstall an update that is installed by WUSA, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a href=\"https://support.microsoft.com/help/3065822\" id=\"kb-link-11\" target=\"_self\">file information</a> section</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 (all editions)</h4><h5 class=\"sbody-h5 text-subtitle\">Reference table</h5>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For Internet Explorer 7 in all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 in all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 7 in all supported Itanium-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3065822-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 in all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">IE8-Windows6.0-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 in all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">IE8-Windows6.0-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 9 for all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">IE9-Windows6.0-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 9 in all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">IE9-Windows6.0-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-12\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstall of updates. To uninstall an update that is installed by WUSA, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a href=\"https://support.microsoft.com/help/3065822\" id=\"kb-link-13\" target=\"_self\">file information</a> section</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 7 (all editions)</h4><h5 class=\"sbody-h5 text-subtitle\">Reference table</h5>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For Internet Explorer 8 in all supported 32-bit editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 in all supported x64-based editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 9 for all supported 32-bit editions of Windows 7:<br/><span class=\"text-base\">IE9-Windows6.1-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 9 for all supported x64-based editions of Windows 7:<br/><span class=\"text-base\">IE9-Windows6.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 10 for Windows 7 for 32-bit Systems Service Pack 1:<br/><span class=\"text-base\">IE10-Windows6.1-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 10 for Windows 7 for x64-based Systems Service Pack 1:<br/><span class=\"text-base\">IE10-Windows6.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 11 for Windows 7 for 32-bit Systems Service Pack 1:<br/><span class=\"text-base\">IE11-Windows6.1-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 11 for Windows 7 for x64-based Systems Service Pack 1:<br/><span class=\"text-base\">IE11-Windows6.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-14\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch. Or, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">System and Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a href=\"https://support.microsoft.com/help/3065822\" id=\"kb-link-15\" target=\"_self\">file information</a> section</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 R2 (all editions)</h4><h5 class=\"sbody-h5 text-subtitle\">Reference table</h5>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For Internet Explorer 8 in all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 8 in all supported Itanium-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3065822-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 9 for all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">IE9-Windows6.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 10 for Windows Server 2008 R2 for x64-based Systems Service Pack 1:<br/><span class=\"text-base\">IE10-Windows6.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems Service Pack 1:<br/><span class=\"text-base\">IE11-Windows6.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-16\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch. Or, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">System and Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a href=\"https://support.microsoft.com/help/3065822\" id=\"kb-link-17\" target=\"_self\">file information</a> section</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 8 and Windows 8.1 (all editions)</h4><h5 class=\"sbody-h5 text-subtitle\">Reference Table</h5>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For Internet Explorer 10 in all supported 32-bit editions of Windows 8:<br/><span class=\"text-base\">Windows8-RT-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 10 in all supported x64-based editions of Windows 8:<br/><span class=\"text-base\">Windows8-RT-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 11 in all supported 32-bit editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3065822-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 11 in all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-18\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch. Or, click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then click <span class=\"text-base\">Windows Update</span>. Under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and then select from the list of updates<span class=\"text-base\">.</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a href=\"https://support.microsoft.com/help/3065822\" id=\"kb-link-19\" target=\"_self\">file information</a> section</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2012 and Windows Server 2012 R2 (all editions)</h4><h5 class=\"sbody-h5 text-subtitle\">Reference table</h5>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For Internet Explorer 10 in all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For Internet Explorer 11 in all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB3065822-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-20\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch. Or, click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then click <span class=\"text-base\">Windows Update</span>. Under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and then select from the list of updates<span class=\"text-base\">.</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a href=\"https://support.microsoft.com/help/3065822\" id=\"kb-link-21\" target=\"_self\">file information</a> section</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows RT and Windows RT 8.1 (all editions)</h4><h5 class=\"sbody-h5 text-subtitle\">Reference table</h5>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Deployment</span></td><td class=\"sbody-td\">This update is available through <a href=\"http://go.microsoft.com/fwlink/?linkid=21130\" id=\"kb-link-22\" target=\"_self\">Windows Update</a>.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart Requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal Information</span></td><td class=\"sbody-td\">Click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then lick <span class=\"text-base\">Windows Update</span>. Under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">Not applicable</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE10-Windows6.1-KB3065822-x64.msu</td><td class=\"sbody-td\">F6C7FF7EACF64A3A75C0F777C472A7273EDCEF00</td><td class=\"sbody-td\">8879F745DA53B9386C3568D4141179CA083587E249CE3776F6DDA4BAA0BD7267</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE10-Windows6.1-KB3065822-x86.msu</td><td class=\"sbody-td\">7296D7A409DFCC302B8C1010B3D3A08E9D33C7F2</td><td class=\"sbody-td\">35D956165837B1C95D5C94AD7F069FD72CAF6D6A8DDD1A5555DD3D12229EBD9E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE10-Windows6.1-KB3074886-x64.msu</td><td class=\"sbody-td\">E65DB15B393FE6917A689D03BAA81325BB67A1BB</td><td class=\"sbody-td\">ED196D463B5B49511509EDE6BC368CC21306B4A19D0E305A7A46C671532C5598</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE10-Windows6.1-KB3074886-x86.msu</td><td class=\"sbody-td\">847FEBB8AF4C3FF86FD768E6D0D37941CE9E7FAA</td><td class=\"sbody-td\">421B966292586BF3AE242D0B84C182A845A45CF5B7134EAAA03953B6EB48154A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE10-Windows6.1-KB3075516-x64.msu</td><td class=\"sbody-td\">A893BC50274A9C22C6A612B41C9113E30F35A45F</td><td class=\"sbody-td\">F864ADF66063A93C1B6030198AD6258D7B40C25D3896EA786E86F82CFA233E00</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE10-Windows6.1-KB3075516-x86.msu</td><td class=\"sbody-td\">CD9CD2D1ABB71D0D32CA793CC7E775A0302020E9</td><td class=\"sbody-td\">923EE94F6F1D4265675BDCA68165B7D11840A21055FA46101D52035953BD954F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB3065822-x64.msu</td><td class=\"sbody-td\">23A21BE2947C7F25D95CAB281D7879571537D8A5</td><td class=\"sbody-td\">4846440F1586AD8F8C5D68FD499E9F0D71CCF4F4AA7203580C0A75F08C5A45BC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB3065822-x86.msu</td><td class=\"sbody-td\">ECFA22D013B54B1E0177B8ED47C68D39DD152E57</td><td class=\"sbody-td\">135455B0F38281E616852497B417E4F9351DC1F86DBF178D97D20AFA7ED43903</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB3074886-x64.msu</td><td class=\"sbody-td\">402E27C98BA8EE2909D1269366446C8DA0905CBD</td><td class=\"sbody-td\">1A70FAFAFFEF5F42938AAC8BD334FB96F67141F1B791BEE725197EA36D2C640B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB3074886-x86.msu</td><td class=\"sbody-td\">6593FF8F920F69BE409334CB22449E76400577D4</td><td class=\"sbody-td\">48DCB7701BDAD622F70C0D5C5E9E6424DDAAA00C368CE55CFCEBEAC125C8029D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB3075516-x64.msu</td><td class=\"sbody-td\">F64868843DD7CA0AD448AEC6B936A646F819A22F</td><td class=\"sbody-td\">59100C97D878110BA73325A4BD0FEA620F8A718F3D93A9ACE4D653219515873D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE11-Windows6.1-KB3075516-x86.msu</td><td class=\"sbody-td\">F3FBFE707BD1B74BFAA3A32549254EDCA33ED1C0</td><td class=\"sbody-td\">72F6E782B696BC87EEADD9FC8BC0750562CB5EB51D409B505403620AF12875B5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-ia64-DEU.exe</td><td class=\"sbody-td\">A475B27B528526DA92474C91130B6A485FCA9F87</td><td class=\"sbody-td\">45449214836E1FA6C531A6727DA9A8021EC5A27232A92C0584A557D5B8857618</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-ia64-ENU.exe</td><td class=\"sbody-td\">21A7BEC2C7E10DBCD4A693BA12DCCC283FC7D1BD</td><td class=\"sbody-td\">81A70140C4926DB4BA1ED038F2BB59190F0ACEED9408D7924633138937C0A676</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-ia64-FRA.exe</td><td class=\"sbody-td\">983C5CC31046CA0FD719B28FF1FE7E8D161CF321</td><td class=\"sbody-td\">39834B3EED14AF1DF405C5DFED982730B65DEC87A450B20137B41F11AC4C2F2B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-ia64-JPN.exe</td><td class=\"sbody-td\">2475A97378B9E834F80E6D3610D1C5763A8C2D75</td><td class=\"sbody-td\">74CB519B42CE25894642AC3B22AD1FD231D1084CE15AA32D8A18C40D13684B92</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-CHS.exe</td><td class=\"sbody-td\">AE2B39840A66417AC80B6603AB7CD959D66C4FAC</td><td class=\"sbody-td\">02D7D1B15CE7F7F3D362015F57E31F7C6ABC2C3CBD7FED2386062372B99B3E07</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-CHT.exe</td><td class=\"sbody-td\">EA53B8D8AC24AFACC77E5A17EF92E530C5F075AD</td><td class=\"sbody-td\">AD03548EF2EE51ACE462B888B0B19DF8F629C4A39449C099A5109ED431688EA6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-DEU.exe</td><td class=\"sbody-td\">E0209187EE13D032E4999C412147AFD2839F1496</td><td class=\"sbody-td\">6036873F93FAA3CA7FC350D85792E6E35EFCCB7EAF544A42117CD3EB7F4E002B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-ENU.exe</td><td class=\"sbody-td\">47B4C49D4D7A07A83635B9E312FA8F79327B69B5</td><td class=\"sbody-td\">376F455C05EE67F2E0980F794B333FE680CC4817B8DF6712FA1D11CA8613A7D9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-ESN.exe</td><td class=\"sbody-td\">0E21B35EF10505E469D7DB01F807EA9CC2D85245</td><td class=\"sbody-td\">23355783E23E860B02B1790927ECDDFBC077F2AFFB108FFECE58739B771B9374</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-FRA.exe</td><td class=\"sbody-td\">6070291A493205BB71095DA971D7221A1BDD4B04</td><td class=\"sbody-td\">69DEF29B4C0B4F3EBF7DCF33E034D8014345060ABC0E3ECA87A354368316731B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-ITA.exe</td><td class=\"sbody-td\">9B1033CD20A78EA3EA8110ED343A10C7B8E13169</td><td class=\"sbody-td\">E0272618B12F68A0E6D009632AA1DB4498D1BC7F38C69EA1C042512766F372EE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-JPN.exe</td><td class=\"sbody-td\">0A46BD10B52FBB5B1DC27C92E959E6521E9D1B70</td><td class=\"sbody-td\">EC64072238882B9A53C3371BDAA1D1810243FD05DFB339835AC53B4A00454401</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x64-KOR.exe</td><td class=\"sbody-td\">D0396A83BF96586E09A5AB47DCCFF36C97499C68</td><td class=\"sbody-td\">3F75CE4C4D46184026D860FC21E82F373E80598B7244F880E8F4017DD340952D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-CHS.exe</td><td class=\"sbody-td\">C1A9811DAC0229D74CB561BE70598438CA557F8D</td><td class=\"sbody-td\">0664DEC8D41B14962E3A062A787D290019C803F9A886BF12993A3C0EBFA8B5BE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-CHT.exe</td><td class=\"sbody-td\">4E15B377F13DB3362D15026447E2CF7710A1679F</td><td class=\"sbody-td\">A0DBDE4F4CC3C12FAF6C651C1886E2BF37C3ED17527BDB38165F1574CCF0CCC8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-CSY.exe</td><td class=\"sbody-td\">DD047D208BBBD3439B9FCAD17605224456D6A6B1</td><td class=\"sbody-td\">959497A5FE89B9516DF452A9E82283086CAF642EFC55DC65711FF4A66532D37D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-DEU.exe</td><td class=\"sbody-td\">F3AAC6B2C88F94956A1990DF2926FC830605EDD5</td><td class=\"sbody-td\">6F1380988E5013B3872E26EAE338F1E948292B2DD723270FBF5D8B0173C21C3E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-ENU.exe</td><td class=\"sbody-td\">3F0B3BBF8AC59287D7FBD5ADBAA0D3C60586CE4E</td><td class=\"sbody-td\">2B47C8A50D3C6EE089F663D544E3EDBA0698FFB5DDE7952B277089EBD0ED742C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-ESN.exe</td><td class=\"sbody-td\">E8F3950CB4222B0AADDB7D717DE168C8707066B6</td><td class=\"sbody-td\">87AB81D9EAEDB1571E0D27586FE5D6FF06E95D5FA7982D869DF585AFD41D43E5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-FRA.exe</td><td class=\"sbody-td\">5062B612871A9E5EC4D3E768D7C855D74F835589</td><td class=\"sbody-td\">D839C12356CE7CF3928862FA19ABDE0ABFBB737340EDD42F3476230773363658</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-HUN.exe</td><td class=\"sbody-td\">ABA53EB8A61A9C252152EA4B6DEA0E89C46E4CBF</td><td class=\"sbody-td\">A1C794FA5BA863B57A37F08E7621486F8D1B436A1BC22C80AEDF2B22A485EBC6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-ITA.exe</td><td class=\"sbody-td\">D2A43D7C4179DF166FC005B86EF7FCCB3C94B18A</td><td class=\"sbody-td\">9FB5CFA85CD8B811B4F916136F4FCECD9C07A59A006E648D5A56AC0867B9B74E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-JPN.exe</td><td class=\"sbody-td\">80A901D774D72ADDEB8915FCEC86E3C68760FD32</td><td class=\"sbody-td\">76135BC4328C963159DB5F219035A385049D8EB3E9BABD9BB4E7EC07DC53EF96</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-NLD.exe</td><td class=\"sbody-td\">5B5322C656F3DCBB9D0FF29AA7432C8402ECB7FF</td><td class=\"sbody-td\">02EED60A824D336D98CB2E6631B2037B1F6ADEE3F99C78DBA039BDA88913F636</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3065822-x86-SVE.exe</td><td class=\"sbody-td\">E4C620F77A2ED825D86C27F3E38D9FBD4B05E23D</td><td class=\"sbody-td\">F13CDC3E06655EB43054055F8FD7F305D2B3970A8EBA08955F43EB99686A81D7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-ia64-DEU.exe</td><td class=\"sbody-td\">4959CBBB607CF9CFF66E06805AA8D243FE049CAA</td><td class=\"sbody-td\">558F4673836021897912439B912DD35166083A33A610A3BDEC9720D1C36A87D9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-ia64-ENU.exe</td><td class=\"sbody-td\">17CD0B4FE29D31047ED25DEAC43D5E8CBC5AAA34</td><td class=\"sbody-td\">51FB9F61E86D7417988F18561DF41EB4B81152679DF225821D44A2CF043AFD9E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-ia64-FRA.exe</td><td class=\"sbody-td\">322833CF5938B9A84ED805C7216E3275A098CD68</td><td class=\"sbody-td\">CF4B02CF68465A3CA2E0203DE88B00E02AF0E9F447D4D4D126F8031703C52177</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-ia64-JPN.exe</td><td class=\"sbody-td\">06D22364A04E637CAC2FB8A0DBDD4D8C52C30CAB</td><td class=\"sbody-td\">35620781B1A8C80E741D4DAC6453C5A0DD5B1F6E81256FA9326E5D63E4AD1213</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-CHS.exe</td><td class=\"sbody-td\">5CC64B9A4052FDA57EF21D3E2AF1F3B4F7715559</td><td class=\"sbody-td\">46BE969964BB15FA80A5F07104131FDDDA9389D3AE29D53A55513B44B6088FC4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-CHT.exe</td><td class=\"sbody-td\">F97CD874CD185341C431D6ED37346CD76CFFD68D</td><td class=\"sbody-td\">9137630032DB3031B75FB539D620BF9FAE1ED727B7F459F84394945604BABBC3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-DEU.exe</td><td class=\"sbody-td\">A793D649602C6E78EF4ABAAE49E03E06181C9336</td><td class=\"sbody-td\">66A323E27654CB4A64867C8417F4FD2B37C33A307F3859EA6189DF8B3DDFD9C1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-ENU.exe</td><td class=\"sbody-td\">5A8740664026293DB6BD82682930347D23F7552C</td><td class=\"sbody-td\">FDFA9D030101E6F8597ADCE744A79EAC11AA5F7F2B38BDAC6849784FB5C2EBFD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-ESN.exe</td><td class=\"sbody-td\">5AE1733F2DD6C53A3B173F23AB2534A58DD014D0</td><td class=\"sbody-td\">99F3B00FF2A5F999997013C6185427B30F2B8D0A88D0786AA83EBFE2CE899CF5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-FRA.exe</td><td class=\"sbody-td\">FEF451918471C4D413E7C5227070DE6C26A37909</td><td class=\"sbody-td\">B8C4DC8C1115194D0044933E90FF4E81DC3E6BFEEF08BF1901DE2E20808D1264</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-ITA.exe</td><td class=\"sbody-td\">B5A71E74F9FDDCBBD3F931855330AB1C228FC22F</td><td class=\"sbody-td\">BC6FE88DD1466E183A7813251A3313EAD21E1D5215E620171277A34C6A42A4C0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-JPN.exe</td><td class=\"sbody-td\">C6622EFB49FCD3B3745F9FC4D42FBFABF4407EDF</td><td class=\"sbody-td\">FA34D34B98BC75ACF9968191812B5C1B6BAEA2573D24DAB87469E3FCB5C138B1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x64-KOR.exe</td><td class=\"sbody-td\">4CCD0FE93A65F0E10C7D8AC15A0B4ABC00F91678</td><td class=\"sbody-td\">7578588903076F0352CF9C62C53FF5680C54CCB711E9F4BB8863220A7B6FF3D3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-CHS.exe</td><td class=\"sbody-td\">D1C9153280BC190936A58834ECC290DB3652D76D</td><td class=\"sbody-td\">11A59CCE2FC3D3346B99131EBE275B6F0675C73C12EE5406687C8B2CFF03B9C5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-CHT.exe</td><td class=\"sbody-td\">839E76E43BEB9DC3692E821DBEC2BDFE73CC1FA4</td><td class=\"sbody-td\">8D5B41ED13ABB5DBAFFFA5E5C5D46251D2129AB918853E21176880808E724D1E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-CSY.exe</td><td class=\"sbody-td\">264D068928FF2D2BE764266BAA8FD06524521BE2</td><td class=\"sbody-td\">3864D5282793D66E1492226D435BAA880596AB00451919CA9583123505DC9B2A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-DEU.exe</td><td class=\"sbody-td\">8E30E6D02654DA69178E5B7A40DE81A49CB8A29D</td><td class=\"sbody-td\">4E8DDE21C2200C2F9FC2CF3CCA5475A22623D7678E77F91190B7C502313CD47B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-ENU.exe</td><td class=\"sbody-td\">905091BB41D6962578DAB9DC4E7FB1F74A302743</td><td class=\"sbody-td\">A9F17BA2682329FD3F478A8459ED63FAB80EA7450C4D083B4693947F4A07ED31</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-ESN.exe</td><td class=\"sbody-td\">FE0C115A8862FE585E626E9A9D6B6373D9177F98</td><td class=\"sbody-td\">9A33377B87F0786E206A9C93A11F8BE7D94D3F716125FD1EE3673F2F1636AD8B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-FRA.exe</td><td class=\"sbody-td\">CA0DDF05D37EA3E8D60A186B962DE74E7BDE776A</td><td class=\"sbody-td\">84E2EE79597B6EEA634668D35E551AA7856474E91CD5209934ECF74A5254D2A8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-HUN.exe</td><td class=\"sbody-td\">17D7A4D4559DCF9594734E0643C4FA60982206EF</td><td class=\"sbody-td\">8A1043C25BECA6AB1B9874B1CA26EF35737EDA5151495518926468F1A7E41579</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-ITA.exe</td><td class=\"sbody-td\">E04ED663A89FC2E9BFA73DA8128DDE10E71A3647</td><td class=\"sbody-td\">CEB6F02E5E9D32E88251833E06427F0631C6D074412F7C92048718A5DA26B6AB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-JPN.exe</td><td class=\"sbody-td\">B7DA9943EEEF7D9FC482300762C2A5D0F77E76C3</td><td class=\"sbody-td\">B1A21AC3FF3FDC8FE48373D33F03C88AA779E57093E544DD345CB108C400B746</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-KOR.exe</td><td class=\"sbody-td\">7CB5351C3BFDB8FA78648C69B11B0C59E55C732A</td><td class=\"sbody-td\">9E26241E23014609D4474FA6D1CCAC3B9A9CD8FEF602378DE73177DF62F56997</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-NLD.exe</td><td class=\"sbody-td\">7DB411433BC1855546154C759FE91F19A982973F</td><td class=\"sbody-td\">0228420DDEE3555E465965767FEA86DD4F5A91F7381B2394A97DCA1E4886FC6C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE7-WindowsServer2003-KB3074886-x86-SVE.exe</td><td class=\"sbody-td\">380A0DAF3687615C8F2790771FC5D6A9509C4F85</td><td class=\"sbody-td\">33FD2B98E81D39503204C0A2D6831BEF550A1514913059F7D1375F57F471B1C3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-Windows6.0-KB3065822-x64.msu</td><td class=\"sbody-td\">D55EC336DE92A2042F7D54D534AEDB0CE11DC9DD</td><td class=\"sbody-td\">65AC3AAFB826E0A8CE9F8EBA8E5CC6DD26122E1DFED0D96686C1CBBC4DD489AC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-Windows6.0-KB3065822-x86.msu</td><td class=\"sbody-td\">925BFCE425E36E3AFE2AABE827BDD604540A548E</td><td class=\"sbody-td\">81135916F1705A02C07335D22F1BED204324E5EE779BDA09AFD05D11321F2B22</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-Windows6.0-KB3074886-x64.msu</td><td class=\"sbody-td\">2DB8883A27BE57F0CC8D53D3AB77119C48EE17E5</td><td class=\"sbody-td\">AE0BFCCC697B2A8378BB6046DB75CA90BAC2663990B4B10889E2007BC5568916</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-Windows6.0-KB3074886-x86.msu</td><td class=\"sbody-td\">8D344BE0870CBEF1A8E81274CE2AEC32232C49BB</td><td class=\"sbody-td\">B10E8D7A84D9273510D3FE5FB72154A93477444483413105C13F0809CE69D5EF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-CHS.exe</td><td class=\"sbody-td\">A64CCFBEBD79119530876B903D0C1963AA305CB9</td><td class=\"sbody-td\">AAB9266CF64CB7830EFC5AC1CD127332CDD059EC0FE5E8C3D7CB2332BB053A97</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-CHT.exe</td><td class=\"sbody-td\">E7F88DE3E25AD3E6BBA657521F01B8894795CA71</td><td class=\"sbody-td\">84B7F0FA3653634A334BCD672FD45132FC19655086467371B7EACDDA28B1BCE9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-DEU.exe</td><td class=\"sbody-td\">EDBEE28DE34E2A2F2784EDDFC6AFD4D054F2878A</td><td class=\"sbody-td\">D34FB546BB2EC4409BE8D3D66E2196EC1A24BF4B784F04A34ADBCEC366F5A5C4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-ENU.exe</td><td class=\"sbody-td\">9B3204D5DB8CAF6DB7EA710A69A9AB2958A0C2D3</td><td class=\"sbody-td\">1A0EDCA601383AE44DD558833A222A2B1BAB83E3730FDB4B7C3FA94B49125DA2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-ESN.exe</td><td class=\"sbody-td\">CDD74AC81E1C4BF02E971FD590F9811C463C3D9E</td><td class=\"sbody-td\">7D4005935560F2C9D9F2DEC572D1CF2E2073FE0C84812A28B645F9149B5AC0A1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-FRA.exe</td><td class=\"sbody-td\">5A47ABCD86D61E4858A43282D9317D1D48B30A9F</td><td class=\"sbody-td\">AA8707ABB300717A470B50E80D4EB54CD6333EF14792A509BCC8F608FF0C2E7C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-ITA.exe</td><td class=\"sbody-td\">18E5E5D14EF42F1E7C2456AA4F2A7613F7F63EF9</td><td class=\"sbody-td\">2786DD86BE41A9506D29F111975E122ECEA251640321F47A0DEEB5D465F818BB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-JPN.exe</td><td class=\"sbody-td\">E3649864A2085EB879497DA3EF0C164528789AF6</td><td class=\"sbody-td\">D9DCE006EC1C74682F888351939BB157891F62F21A703D1F884ED6DD4FD5B01B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x64-KOR.exe</td><td class=\"sbody-td\">DD3B06B5B2765D5B074672DE46D6C629071CD9E1</td><td class=\"sbody-td\">38F26B1174BB98FFE06B9135EF80D01818385A7E1B0756FA0ACF9B1A60503498</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-CHS.exe</td><td class=\"sbody-td\">2D5DB313102F4BBB6FD345AB829C0FD412347CBF</td><td class=\"sbody-td\">213209D1300974FD14620BE5DE3DF064E1FCE7BC70F919B7C2DA2726E50383F0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-CHT.exe</td><td class=\"sbody-td\">38FD5439A883C71D2FBC188FFFC2023D0375EDB6</td><td class=\"sbody-td\">AA7E1269BDF730213BFE415EB696E1BFD976A935BE8EF250BA5C042414E5258B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-CSY.exe</td><td class=\"sbody-td\">7104E8489748CDE15717C61F49C44723F6D68FC2</td><td class=\"sbody-td\">C23C31C5C40F2476ECEFF6DDD129A943C1A7E121D4862308FC8677162A52D7BD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-DEU.exe</td><td class=\"sbody-td\">214C93BC96C9E13B73024A78581B669087D1A65E</td><td class=\"sbody-td\">AB71DB50A03668C2883F15E89CDD8539B0EC9758DCA20BC357E90AC1E6F2D7C0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-ENU.exe</td><td class=\"sbody-td\">42918CA39E66F746DDB00077958D58F44A1295DB</td><td class=\"sbody-td\">AEF17118B2FB9A1F6A8F2E026B8555A082A1D2C4607A0E7BD2ABFAD8982DB199</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-ESN.exe</td><td class=\"sbody-td\">D316DA1D6FB89925A27B3C8B20E63D83B54AA5B7</td><td class=\"sbody-td\">5C92CA06F1BAAC513510B49FA0F0FEB6E42E1E7E9027D6A91B1F50F1D426BD2C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-FRA.exe</td><td class=\"sbody-td\">7F04E77CA3E06EC6B41A4A3D35E25D8EC2730A86</td><td class=\"sbody-td\">54D94BB2A153912C41B624D2E77A7448132695737D3B1594F593CCE6849929B3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-HUN.exe</td><td class=\"sbody-td\">858A728D50263BB0E2415F189E3BE7EC008B776D</td><td class=\"sbody-td\">C085719B0992B50E591F3D06CE25CD0003345CE1BFACBBC7ECCBB8A82C44C56C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-ITA.exe</td><td class=\"sbody-td\">180E0AAEE408F70D115D048FCE5FAD0313EA820E</td><td class=\"sbody-td\">3A52C9F94281A5B41C7C01DAEA70617C26C4147BC5006BB610856B3BDB18DB20</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-JPN.exe</td><td class=\"sbody-td\">2D6F9853D2CB3C945F79FEA0343A72EEF3592A07</td><td class=\"sbody-td\">798051F67B6C693DAC19DE85F9B8136673CC206A655E5DEC772B3F80A694B0C3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-KOR.exe</td><td class=\"sbody-td\">11C12CD67D3AD7FF8799D14FBE7F92AAA4C72301</td><td class=\"sbody-td\">0097C2A0E77836F3D07E66EAA495F272EB1682964E51D8C353A742E5B4FA2706</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-NLD.exe</td><td class=\"sbody-td\">D9FF4934A37E9EBF061495072228BC0F776B7DA7</td><td class=\"sbody-td\">E072DB2842B8329D32C246AF23CDDD34EC1E4313DE492B252BFBC168BAC752AA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3065822-x86-SVE.exe</td><td class=\"sbody-td\">6443171DAFBDA57F4E8DB83CF1172A41E9AEE1BE</td><td class=\"sbody-td\">61795E2A5BE07FBADDCF22D9066EE62298A2B6A550C76B606CFE50E543AFA505</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-CHS.exe</td><td class=\"sbody-td\">D14CDDD05F1BC0BBC4AE119163A49109170632C2</td><td class=\"sbody-td\">7414A44CCE0837B1660D3DD1B9AFF243F31E1EB8EA504F796849CFF750AAA950</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-CHT.exe</td><td class=\"sbody-td\">34802BA8115C2096E842AEA940E53CA0271CE284</td><td class=\"sbody-td\">CEF13569A5D96F70783615361D5AFC656B271D443CA6F4156D306CD0D334F51F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-DEU.exe</td><td class=\"sbody-td\">EF61E1F5BEF0EC2493CE72A777953242EAA7523E</td><td class=\"sbody-td\">21DF56948A3E400FD151979E7D7E2F4E34F98E2EF2379451F2F90423470FB571</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-ENU.exe</td><td class=\"sbody-td\">5FCCE26726EF29F5C82E212048D4E1073A996A37</td><td class=\"sbody-td\">87BC95462B216485FE85C9375C6776F0624830D35668FF73C9C6C91F1BCFBD5B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-ESN.exe</td><td class=\"sbody-td\">AFED8AC6B5ED7E25363FD7D5559D892A65C13D55</td><td class=\"sbody-td\">F971AA6CC76E95A03E573FE1EC1B5CC5C65D7CE72216EB1D59A38A3E917DD521</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-FRA.exe</td><td class=\"sbody-td\">618E4B822AD5A3DF2CB49BF97DB1ACDB1C9BB86A</td><td class=\"sbody-td\">687249A52525B17BCE6F350A3699804AC059F101C6F3891D1E9A0FB8F50DB5E1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-ITA.exe</td><td class=\"sbody-td\">53B5891627502F54BCE5D10995F1032B02ECBCB1</td><td class=\"sbody-td\">2B6D84BB9E59009D488959AA68902D9389CBC480794C95F54CFEA375B4E9E8F5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-JPN.exe</td><td class=\"sbody-td\">F656210E05735A7EA8C9F4220EB85243251C6FEB</td><td class=\"sbody-td\">67CF3D95B10052A0E71288425466F53E6C09E3EDC4AF887678F93E81F0BCCA80</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x64-KOR.exe</td><td class=\"sbody-td\">CAEACF7616D136B554A7C8C6A48106DE13BF3930</td><td class=\"sbody-td\">3F11E2B0917851A23522D2DED812F5441C3D3EFB9D32C315684FA1D829C20698</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-CHS.exe</td><td class=\"sbody-td\">DC3F49E8603E6B6A2D76E6E7C9F855729E04D4F1</td><td class=\"sbody-td\">D880A64D6C7D6D80675605AF077D27C7EDA83257FDDC13191DF3F60D50DA7E52</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-CHT.exe</td><td class=\"sbody-td\">1E53CA0FBB9F52B1A8D7ABBFCCE0F341FDEC573F</td><td class=\"sbody-td\">7258F656B931EAF948348828288B1357D5565F046FCE80AF7E4ED8493571FB7C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-CSY.exe</td><td class=\"sbody-td\">8BF1D7D713B64A6DCF827C212072C289FF2CFC4A</td><td class=\"sbody-td\">F0F5EC6BD549C7C0842960986A5462546DDD94B5B07976835E50825A6E8A3E1A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-DEU.exe</td><td class=\"sbody-td\">E0F6073C8C32B111175C65662D0028A273151585</td><td class=\"sbody-td\">3847794BB39AB4EC4FDBE6AC00A3CC491F98D2546BB74D5B432089A6ECCADA24</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-ENU.exe</td><td class=\"sbody-td\">43F0E5BD95B35821E396FC30540C0DA4DC21FC93</td><td class=\"sbody-td\">D743B9216494CFCBD2FD24ABBF96A97631610F8103BEE307ACDF2CADD6F6C636</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-ESN.exe</td><td class=\"sbody-td\">DAD941840B57EE485333DED3C28732D8D7FD3357</td><td class=\"sbody-td\">43AAF290F18FAC093AF6D2F8BB39B99509C785D0E71CDD643C542FBBA303E43B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-FRA.exe</td><td class=\"sbody-td\">106BE4B3B4BC5DB94800E1C897BC51835DE23A9D</td><td class=\"sbody-td\">2165ADBDBB5347CC6AF7F7E7DCC7287674F328B9148EF71A22E0509BF8413A93</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-HUN.exe</td><td class=\"sbody-td\">DAC9623090CC5C5D6FE8DC96C2A8224701F7CC33</td><td class=\"sbody-td\">6DAAD479CAC9304DE06C1804608F8AD1DE4259F5F3C3DC89DE907339DDEFA375</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-ITA.exe</td><td class=\"sbody-td\">D936E8F51C08D33CC56475550D7EDA173F2DD6CD</td><td class=\"sbody-td\">32EEC88444C0D552391F99FAFCAD20B00A61E19855BEDCEB421B5CABF496681D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-JPN.exe</td><td class=\"sbody-td\">D68183142D4F0BA712E3938B5244F5B39FD2110A</td><td class=\"sbody-td\">A1A4BF553614A369BF680D127DC33F45B81AF9AC35CC7F191789D90DE9446113</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-KOR.exe</td><td class=\"sbody-td\">0E9545B01964ACB4B30A7228336E9622BD87D5D3</td><td class=\"sbody-td\">462B7367B5935E9922BE5E71FE035FDEE0B6903EB80AA40248D067D1C34E9027</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-NLD.exe</td><td class=\"sbody-td\">CCDC90AA17669E6E38ABD780A22EA9C7E3017276</td><td class=\"sbody-td\">C5AEB83CCDFF5CCB587A45D6899EAAB5657C65D89A796678F55BA1B5BF7AF754</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE8-WindowsServer2003-KB3074886-x86-SVE.exe</td><td class=\"sbody-td\">579F7168B539590E4C758450E32229EFB5A6E962</td><td class=\"sbody-td\">EB36258F053624B967E66F74023AB5E884193972F50B12AB377CD2B1C0F42161</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.0-KB3065822-x64.msu</td><td class=\"sbody-td\">9E1F25005BF7509AED0C432572325645948911CC</td><td class=\"sbody-td\">A242013787F51E5CB6F12CE1F0A9C5BAD1402A91825253F2F608DB5EB038BC4E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.0-KB3065822-x86.msu</td><td class=\"sbody-td\">DE0A67FC94409D4DAE386B31338A0D1A13E55703</td><td class=\"sbody-td\">0C92FAA8CE4FE258C6221F1CCAD3C3A8696BB366A35D27A75BA773BABBE43C96</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.0-KB3074886-x64.msu</td><td class=\"sbody-td\">8EE9EA732B7DA017F6B6A2277C826F677BDDA356</td><td class=\"sbody-td\">5F3245F27467ABF984918518E65C5CB823CCB80237B8FBEE6EC5B6CB9458985B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.0-KB3074886-x86.msu</td><td class=\"sbody-td\">BA82F99EA2DDD51492A552BD8CC6E3DDE4434A21</td><td class=\"sbody-td\">6D6CB431A4263AB79DCFAD359E6E2F5F1BCE173881952E88C823076787E24D29</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.1-KB3065822-x64.msu</td><td class=\"sbody-td\">E3F5BCE38F1C2C5CB4B7090A6BF33FAC9AA39BCD</td><td class=\"sbody-td\">428F1DAAA19148546C8E07F2741D3C1DEE510A1FF48056E2E71017BD4678E946</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.1-KB3065822-x86.msu</td><td class=\"sbody-td\">F92AFF29AB85E86C4A9D6FCEB53C8D71134F20DC</td><td class=\"sbody-td\">DC1EA600DF30456FD10776C3EE2A8BEF4717670B3A3DF4C07BBDB8F18CCECB51</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.1-KB3074886-x64.msu</td><td class=\"sbody-td\">178D03D8815ED5068038C169AB936809073BB47E</td><td class=\"sbody-td\">A647AED863CA47A0EA953CDFE16E98BA118EF886CEA6606D8242AE742BDB6D6A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">IE9-Windows6.1-KB3074886-x86.msu</td><td class=\"sbody-td\">DFD43FF15520E39DDAC8CD089AF0C7237B0824CB</td><td class=\"sbody-td\">B93221A554336B84C9691E652E96A7C65AE66F224C9FCEA915753160593A98AA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3065822-ia64.msu</td><td class=\"sbody-td\">572BA8B5CA27AFF32D0E807F815E284964292277</td><td class=\"sbody-td\">0234BFCFD32DCE26E5ED29B496696B912A8214D2D57DD2A41C8631969AA64F9D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3065822-x64.msu</td><td class=\"sbody-td\">332F17ADFA8F0E1FB12DD69D408F8E49BF3C4008</td><td class=\"sbody-td\">47FB64D5286125806EE96A384BC184AABE088FDC303F93E86E549CFA38302483</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3065822-x86.msu</td><td class=\"sbody-td\">5B08AFF063C52CB6D4074BD99203F2C8FBF02E08</td><td class=\"sbody-td\">F786093C1D5A511B1D48A314E2100EAEDE8DFF6FEB42E8A1F72D424F0AAB1E41</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3074886-ia64.msu</td><td class=\"sbody-td\">2F2DB1A04E7C4B54D664544CAAA24252B3D7C442</td><td class=\"sbody-td\">F8B04F7788D6CE69EB993E1FA9D51387C3F85E50F15860D63D8F122CA5068513</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3074886-x64.msu</td><td class=\"sbody-td\">AB69805AB9D03651F935A7FCF8E57CF195390C98</td><td class=\"sbody-td\">E0BA7E612000341E149C27815FF9A01AA892C44512F6FBD2132D603662D9C8ED</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3074886-x86.msu</td><td class=\"sbody-td\">F88BE7C386E38C42D7FFB0C3128345BFC10E5F2C</td><td class=\"sbody-td\">A81DA65462BFE6DC856BB5CB72F79A095D7477DA0E816BC0F120874F1F591DE9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3065822-ia64.msu</td><td class=\"sbody-td\">0A6F616C25B8D58F9E740386DCFB92017B741939</td><td class=\"sbody-td\">8ED60F88AB519A619F773DD16D0DF628DDA282A15224BE98360677623C4C76EB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3065822-x64.msu</td><td class=\"sbody-td\">E66D4720DFDB95EFD76E6E65E80061A9C9858DBC</td><td class=\"sbody-td\">FDA887B4416055264FC0D73D973516C43E8D2F339D5A48EF4145CB44BB5FC862</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3065822-x86.msu</td><td class=\"sbody-td\">73B19A44858849458C46CD6B4F855B64ED2C2A87</td><td class=\"sbody-td\">130018D516F6A0C95B8B9BE8C525E002EA0298A2FA5D9877BA55D2522471D9F1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3074886-ia64.msu</td><td class=\"sbody-td\">AC3A52CB46D3BB289E8457A46634C4C0FCBE7742</td><td class=\"sbody-td\">3FB63DD59C5DA603602CE12F2073EEA902AF79EC6BC24290FCEBED5605B3CD59</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3074886-x64.msu</td><td class=\"sbody-td\">793A91431F1265E9340A0B06E0DBC6BDE171A881</td><td class=\"sbody-td\">486BE9FBC6BD8FD260C0A0600F685FF49F59601E2CE4E29C29BA2F18598B16B1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3074886-x86.msu</td><td class=\"sbody-td\">3EB2D31EA0B4E8431C9DAE4B8C37053CDB4ED164</td><td class=\"sbody-td\">DA6F99ED9B2D6A12F694B431693B927E3321585F5C4548344BB14269541448B9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3065822-arm.msu</td><td class=\"sbody-td\">64E2E197D1F9F09A5DC0980F49393DA90FE2DD4E</td><td class=\"sbody-td\">44877184D24D64163A79385F0D62DD75047FFBF28B7EFBD4757188746A4F48B8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3065822-x64.msu</td><td class=\"sbody-td\">D79A1B9DBA024F1AB48E64670007F257A2750AC5</td><td class=\"sbody-td\">4FECF49F18EE040B88C86F5A5FAD5E157568D46C709E6587A162B5BF8F302715</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3065822-x86.msu</td><td class=\"sbody-td\">DE753CE2AC77733A6AB76A7ECE224480F4D666EF</td><td class=\"sbody-td\">D1235697F11BBE2ACF2271A02DD9A5034F61C8760E18EDE3C22A1D7F2D108360</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3074886-arm.msu</td><td class=\"sbody-td\">DAE6B366040A37F55E2B4F6C5A5806514A9930E6</td><td class=\"sbody-td\">E96E993D159814554DC2898F2F9C6E11C6D96786D628C6FD01A1F06FAC8EA1E1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3074886-x64.msu</td><td class=\"sbody-td\">C527592F4B766CFAD3BCAE0FAF8187B382EB6A61</td><td class=\"sbody-td\">62970F0346A1BCAC3BB2A67CA3AAEB73727F6CA71FDC7BEBEFCD03011F9E3F58</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3074886-x86.msu</td><td class=\"sbody-td\">29CE8038B155D584E53E958007FBCA12A5DEF16C</td><td class=\"sbody-td\">6844635BB6F00147F9E987E4E59E5AFF40D2077E5A43794CB0F4A6B5954B9995</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3075516-arm.msu</td><td class=\"sbody-td\">5147E2A16DCEABA21ECC61C1277BBE215C69D7B9</td><td class=\"sbody-td\">CD58B5EA601E2CE8DB9FB992A38C2BD0D391AFAD10BD532925A106E291E012D2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3075516-x64.msu</td><td class=\"sbody-td\">B5E73DE11540EFAF9658C5FF7A012EA1D32D19BB</td><td class=\"sbody-td\">B97FFF24EDD539CAB4782D9A5881908E10A6D2357102C426A7A5550EA726C4B4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3075516-x86.msu</td><td class=\"sbody-td\">3E2EE38ADE78063B577B9EEA1BB41A8188475BA3</td><td class=\"sbody-td\">A7CDD8534D4880C412C99C1257CF3DEBDBDE49A752E1AE23D1D43D02630789B6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3065822-arm.msu</td><td class=\"sbody-td\">9B2C14291D8731FD20004E3281A93FF126CD73AA</td><td class=\"sbody-td\">40F2790BFAA4A0348AE73203F579EE0D4F3CAB7CBCB997B60AA8EE1CA178338A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3065822-x64.msu</td><td class=\"sbody-td\">EB7F8227A29892D0A45AFAD4699AD521C99FF7EF</td><td class=\"sbody-td\">58ACA8385FF05DCA08809908CAF7AE232426875742DB4A4A9152BD4D70EDCEA8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3065822-x86.msu</td><td class=\"sbody-td\">65A8ED18C33D937F3AAD9654FD3030A8B03E791E</td><td class=\"sbody-td\">12E206197641F13E2CBFE01ABB0A16299879F164E7E15CA4E04FE4F086AED33D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3074886-arm.msu</td><td class=\"sbody-td\">5177EF0DDC6781447CC4877FBF1198092A2C636B</td><td class=\"sbody-td\">3FE9D14C81A8F34B4E45890683C84E30E5743B97943576F582BA01ED6BD48ABB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3074886-x64.msu</td><td class=\"sbody-td\">3887B71F52B644374ECA5C86E4DC82BA9F39F850</td><td class=\"sbody-td\">71BAAA581140C1B14794F66A0A336AF0019F50026397A107BB318CD654D92A61</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3074886-x86.msu</td><td class=\"sbody-td\">BA68CD88B34285B8ABEA28392DE01F2074ACB0DC</td><td class=\"sbody-td\">008D9C4A3FD7F6C5FD5DE88E70B3832BFCD0D576ED94D46C5CA4B2A70ECDA58C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3075516-arm.msu</td><td class=\"sbody-td\">773A8C5CB02304FF7B08231671C46B4257E27125</td><td class=\"sbody-td\">8DECF6843A139F01CFA8DA444435B03A36016CCB88CFAE6C1477D00F600D72AA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3075516-x64.msu</td><td class=\"sbody-td\">C5853C372E17498FC7C8278BFC670530244BFD8E</td><td class=\"sbody-td\">097C81220D9155DFC617E00E178B6832A33F0F15CAD92F293EF367B44AE2EE19</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3075516-x86.msu</td><td class=\"sbody-td\">FA56F0B7A23B5119E90F9F1897C943D9D205CC73</td><td class=\"sbody-td\">468E79C6F73F3709B0DCA59D2AA8B360C4E7BEC00D45566B8A2370906B15FE8E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-ia64-DEU.exe</td><td class=\"sbody-td\">F26628CAEAF0BDEE267407D26A6765B6ED2ABBA8</td><td class=\"sbody-td\">A46511424AF1365FD80916C6183C7919C86D1B1504D4A2E1E24B74EB15335E42</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-ia64-ENU.exe</td><td class=\"sbody-td\">803E9AB7D9CD71B161935EC033CE71F297A1BF28</td><td class=\"sbody-td\">E7DD0D83852737AD8BB6A21B14D9E6B044730003E0430EA3195C34AFBB24D08E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-ia64-FRA.exe</td><td class=\"sbody-td\">FD38C6A1668C78B04B3A146F2C22473F89C959A7</td><td class=\"sbody-td\">EDB995BC4FDEDC5E132B055C3AAADC599667A6496F9C6881213261D662D92C18</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-ia64-JPN.exe</td><td class=\"sbody-td\">AB28E517CE7780D7FB2BE27C8E17A6A1E301041D</td><td class=\"sbody-td\">29E56F436A50D41E9B3AE3D7E358E202084DB92C9A3A027F20668729FF00D115</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x64-CHS.exe</td><td class=\"sbody-td\">CE90681715DAB8BD7C1D37089C41C6E45C9F9769</td><td class=\"sbody-td\">62A5B762943B10A5ED817BA704A81711038FA6DA95D1495D7164D3E787BA840A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x64-CHT.exe</td><td class=\"sbody-td\">E656DBC5E8C389148C53C2E589DC36A2F70882BE</td><td class=\"sbody-td\">C5E9236B9352B26539B27078C08CD3807FD7C1C77FF7929908414F7D2C0F5B49</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x64-DEU.exe</td><td class=\"sbody-td\">5E8ED75C81CC49FDA4358313E2ADF8785091ADAC</td><td class=\"sbody-td\">BE0741C53B25E53D62F82740DA6EA163B6CA5C0E0CABD22DFFBE19E8E5CBD5DB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x64-FRA.exe</td><td class=\"sbody-td\">5744B84CFE249CAB9762CCDB584B7640D73CC54B</td><td class=\"sbody-td\">002B845C728F0117117FAE8466576F01A64F0861F68339654F2D34914D94AF9C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x64-ITA.exe</td><td class=\"sbody-td\">F67C562E7BC21DFBDE62B8516EDFAA27DFBB965D</td><td class=\"sbody-td\">30FAA47D6088B85A4E04E28C383685EE0A11B8018E280466F0D4330718333F1E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x64-JPN.exe</td><td class=\"sbody-td\">98BE916457D5985D5896FCA20E9EF4339067E330</td><td class=\"sbody-td\">C6168C2E3501E2671CB70E8F6A94F05568588CF9D8A9FFBACDC53B4054B1EEE8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x64-KOR.exe</td><td class=\"sbody-td\">B43521FC804C6E449DC4F229F5F01BCA35139FA6</td><td class=\"sbody-td\">6A56CD2B0E59F837ADAEF743CF554501F6257F1FA9758180D9E75C80931AB4AA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-CHS.exe</td><td class=\"sbody-td\">7DFC34457FBA5D7053DD6C101829D82909DF4A69</td><td class=\"sbody-td\">B450D418E3E3FFE6AEFF76172F1A5CC3E83246748B85228620708CF4710EE18A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-CHT.exe</td><td class=\"sbody-td\">B280C0AB3ACE343F0F15C874ED2F60EFB565AE22</td><td class=\"sbody-td\">39F26910598C0294F238AA90B748E250D55DAC5322759CCAB09558B3E71CF543</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-CSY.exe</td><td class=\"sbody-td\">36226E198568E72DA8E470DC752965C805EA5693</td><td class=\"sbody-td\">D6808A8B9F7486DE9384C8C115B7ED8131A6471D7CDADDC418B277FA359F879A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-DEU.exe</td><td class=\"sbody-td\">32641CACE9561A510E8852AF9C38556FC9C4CE81</td><td class=\"sbody-td\">FD13B4AC3D05814E2E670100EE07E0CDD3A24F5E538A0013AF334EB1CEA68418</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-ENU.exe</td><td class=\"sbody-td\">0BF660F5824DF5965A24DCD31705EAE1A7028360</td><td class=\"sbody-td\">AF143C17DC34D2B22F7AF1245BD2A6CBFECABA2F4AE3676D7BC504F5E5F300D8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-ESN.exe</td><td class=\"sbody-td\">E2D9FC2B23783D57A1EF2AEA4CF9F760E81BFCBF</td><td class=\"sbody-td\">D4B141ECE8048EB02985FE631153419F63D1B9EA035C18D9B33EE2EB65837DA1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-FRA.exe</td><td class=\"sbody-td\">67AACA441A27FC6A2B8ED56F4391B889D19FAAB0</td><td class=\"sbody-td\">ECB02D586482B74A051C8BA96AED8AFB456D1E2D2C5AEFC198DB5A52286C0FCD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-HUN.exe</td><td class=\"sbody-td\">99CC91B6596E4E25B5425F779CF71DAEFC2EEC2D</td><td class=\"sbody-td\">50CE0A40E88655304AB3BF4DB695C2478D1184BDC503EAE36DC46F27B4E462B2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-ITA.exe</td><td class=\"sbody-td\">0457031115E37836024A5C01C0DEB6C76EC54CC7</td><td class=\"sbody-td\">51A2F3BB848F0D157427F0087949ADC5F6B0B1C14040EC12145EBE053C4DFD8C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-JPN.exe</td><td class=\"sbody-td\">2BD6557BD15D5E9C1C0019256DC0D4F76C3E9E96</td><td class=\"sbody-td\">ACED3861499889CF158F2697E71A19F9285FA8484F4B85DAE2BEADAA28D0D0A5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-KOR.exe</td><td class=\"sbody-td\">A86D5D271DE48EE03817E0034266EC805085F751</td><td class=\"sbody-td\">6CD47ADC1614B1478D337A702EED4364148D6B8435CF68E112E90B878A540646</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-NLD.exe</td><td class=\"sbody-td\">1B27373C97F6461C27A0A91BD1B391FCA26A74FC</td><td class=\"sbody-td\">7CA54AA578DE2FDAF83FA6124EDC4C54333FCD373BA3724612FD19E6A2396E3C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3065822-x86-SVE.exe</td><td class=\"sbody-td\">0871C9CCFCD6CA06368C6ADD8F8D7C68DBC17515</td><td class=\"sbody-td\">983D8D1C1F2063532E15E6D45B62444A9F52D5224B965EC3CD160A18BA9BA33E</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help for installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-23\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-24\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-25\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-26\" target=\"_self\">International Support</a></div><br/></span></div></div></div></div></body></html>", "edition": 2, "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "mskb", "title": "MS15-065: Security update for Internet Explorer: July 14, 2015", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-1767", "CVE-2015-2401", "CVE-2015-2385", "CVE-2015-2422", "CVE-2015-1738", "CVE-2015-2391", "CVE-2015-2414", "CVE-2015-2383", "CVE-2015-2408", "CVE-2015-2413", "CVE-2015-1729", "CVE-2015-2404", "CVE-2015-2403", "CVE-2015-2410", "CVE-2015-2402", "CVE-2015-2419", "CVE-2015-2390", "CVE-2015-2397", "CVE-2015-2388", "CVE-2015-2398", "CVE-2015-2425", "CVE-2015-2411", "CVE-2015-1733", "CVE-2015-2412", "CVE-2015-2372", "CVE-2015-2384", "CVE-2015-2406", "CVE-2015-2421", "CVE-2015-2389"], "modified": "2015-11-09T07:45:32", "id": "KB3076321", "href": "https://support.microsoft.com/en-us/help/3076321/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:44:36", "description": "<html><body><p>Resolves vulnerabilities in Microsoft Windows that could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application.</p><h2>Summary</h2><div class=\"kb-summary-section section\"> This security update resolves vulnerabilities in Windows that could allow elevation of privilege if an attacker logs on to an affected system and runs a specially crafted application. To learn more about the vulnerabilities, see <a href=\"https://technet.microsoft.com/library/security/ms15-073\" id=\"kb-link-3\" target=\"_self\">Microsoft Security Bulletin MS15-073</a>. </div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><span class=\"text-base\">Important </span><ul class=\"sbody-free_list\"><li>All future security and nonsecurity updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-4\" target=\"_self\">2919355</a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-5\" target=\"_self\">2919355</a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive future updates. </li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href=\"https://technet.microsoft.com/en-us/library/hh825699\" id=\"kb-link-6\" target=\"_self\">Add language packs to Windows</a>.<br/></li></ul></div><h2>How to obtain and install the update</h2><div class=\"kb-resolution-section section\"><a class=\"bookmark\" id=\"obtaintheupdate\"></a><h3 class=\"sbody-h3\">Method 1: Windows Update</h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see <br/><a href=\"https://www.microsoft.com/security/pc-security/updates.aspx\" id=\"kb-link-8\" target=\"_self\">Get security updates automatically</a>.<br/><br/><span class=\"text-base\">Note</span> For Windows RT and Windows RT 8.1, this update is available through Windows Update only.</div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Method 2: Microsoft Download Center</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.<br/><br/>Click the download link in <a href=\"https://technet.microsoft.com/library/security/ms15-073\" id=\"kb-link-9\" target=\"_self\">Microsoft Security Bulletin MS15-073</a> that corresponds to the version of Windows that you are running. <br/> <br/><br/></div><br/></span></div></div></div></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Windows Server 2003 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\">Security update file names</td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3070102-x86-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3070102-x64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3070102-ia64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Installation switches</td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-10\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Update Log File</td><td class=\"sbody-td\">KB3070102.log</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Restart requirement</td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Removal information</td><td class=\"sbody-td\">Use <span class=\"text-base\">Add or Remove</span> Programs item in <span class=\"text-base\">Control Panel</span> or the Spuninst.exe utility located in the %Windir%\\$NTUninstallKB3070102$\\Spuninst folder</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">File information</td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Registry key verification</td><td class=\"sbody-td\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Updates\\Windows Server 2003\\SP3\\KB3070102\\Filelist</td></tr></table></div><h4 class=\"sbody-h4\">Windows Vista (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3070102-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3070102-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-11\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under Windows Update, click <span class=\"text-base\">View installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3070102-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3070102-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3070102-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-12\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under Windows Update, click <span class=\"text-base\">View installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 7 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3070102-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3070102-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-13\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the /Uninstall setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then under Windows Update, click <span class=\"text-base\">View installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 R2 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3070102-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3070102-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-14\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then under Windows Update, click <span class=\"text-base\">View installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 8 and Windows 8.1 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8:<br/><span class=\"text-base\">Windows8-RT-KB3070102-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8:<br/><span class=\"text-base\">Windows8-RT-KB3070102-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3070102-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3070102-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-15\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under See also, click <span class=\"text-base\">Installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2012 and Windows Server 2012 R2 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB3070102-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB3070102-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-16\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under See also, click <span class=\"text-base\">Installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows RT and Windows RT 8.1 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Deployment</span></td><td class=\"sbody-td\">These updates are available via <a href=\"http://go.microsoft.com/fwlink/?linkid=21130\" id=\"kb-link-17\" target=\"_self\">Windows Update</a> only.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart Requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal Information</span></td><td class=\"sbody-td\">Click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under See also, click <span class=\"text-base\">Installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File Information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3070102-ia64.msu</td><td class=\"sbody-td\">066B7E1D791D4F28ABCBA715BAB64EBFE99E15E9</td><td class=\"sbody-td\">6C2F6E179C343F7281C32753026327A0A20786E9255964325383910167CCF02B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3070102-x64.msu</td><td class=\"sbody-td\">01693DCAA34891C3C86352C9A5F0DF7D864D8BB2</td><td class=\"sbody-td\">F2CACFE77F6C97D851452B60E3EB1390A0EC90B05ED0DCFEC9934C238D2C15EA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3070102-x86.msu</td><td class=\"sbody-td\">A3FC452FD3072C2E8958141CEFE590F51CFDA660</td><td class=\"sbody-td\">1A9AE8DC10CDCE714F4FDBFBD6BAE39E5CD1ACFCF9A82BB040D00E79DF835845</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3070102-ia64.msu</td><td class=\"sbody-td\">5A482794601C0897F948A226B4E88E7BD8224708</td><td class=\"sbody-td\">2375FF7F1338E1F003FB7519FF0B677851846B6E1B588DBA5DA9BF9DE10D5590</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3070102-x64.msu</td><td class=\"sbody-td\">26CB5B555F2085839F049D7F6716BEDA72E2CDD7</td><td class=\"sbody-td\">D10F2432AA68F4CAD6D70D71874BDC72D19DF76795D3F33D12AF7D083FED7AA3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3070102-x86.msu</td><td class=\"sbody-td\">3912FF429134134C58372018456B0B849365AA91</td><td class=\"sbody-td\">B90370DD9E2772BC1D2B0E210D43366D94110CBEE463ED7D78058CDB188ADC5D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3070102-arm.msu</td><td class=\"sbody-td\">D8A9BFC6B5CCB2A23AC908B72EBAFB8E595E78C6</td><td class=\"sbody-td\">EF68D3F5A9CF3031050453F344F8AC3375564C1712AF3D8ED6F4D739C8CFDB2D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3070102-x64.msu</td><td class=\"sbody-td\">6B6A4C20D50BC183E9E7D825B3021214454F97BA</td><td class=\"sbody-td\">FC549A24326109D42AA1A89FA2DF9E01370694B0AE590A56FE86DF5DB8C7647F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3070102-x86.msu</td><td class=\"sbody-td\">F3CD08811FD660DB1B3D5891EF99359A3FD87CF3</td><td class=\"sbody-td\">04ABF1D54C8F103B6567A7AA7F43397DB62ED5C895720920D6CAF53C62D0BB1F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3070102-arm.msu</td><td class=\"sbody-td\">68C0307A380E786C2435F93B3771CC42319BCE76</td><td class=\"sbody-td\">6F58070F7D47C38FCA42BA2C8DBDFDCAED50C32B06BF6302A6C23D50503D6426</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3070102-x64.msu</td><td class=\"sbody-td\">99AC1BCA1492597773258AE092FB35BF18A94A99</td><td class=\"sbody-td\">FDDCB7B6C662BD4C95CF304E7BE31474D617981A0BAA4E91CBC6E71B456712B3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3070102-x86.msu</td><td class=\"sbody-td\">CB61CAB6649745B74719295C4AA949D84FA7DCBB</td><td class=\"sbody-td\">B68CE5E30E44F98ACE1FE2C4136DA9B8A3F498D6400EB54C9A5B047925094DFF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-ia64-DEU.exe</td><td class=\"sbody-td\">B9200A3FC99D6D3EAA2FDCE0FD12AE7E6DA7FAB8</td><td class=\"sbody-td\">9200E9CE5EB8F17480C125AB68C2001CCE7C3AA2FF2DAE2CEF977EF615071E1B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-ia64-ENU.exe</td><td class=\"sbody-td\">9AAE4830FCD702BDF7AEFEF2784381D2CBB19732</td><td class=\"sbody-td\">5A995024BFEAD1BC6A4044CC83DD758DEA5E7789CFBFE3B81FBA0033A83DCFCD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-ia64-FRA.exe</td><td class=\"sbody-td\">AE84DFEEA78686EB1EDE3E127B310089EEBC5A76</td><td class=\"sbody-td\">584C2F7B1A094628957A7E14F3A073EA0082A80D92872263FA5D7A7DE1B4C1E6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-ia64-JPN.exe</td><td class=\"sbody-td\">F23519B41654AE9F94C3C646672DA3BBA31066DB</td><td class=\"sbody-td\">6627EB07C96906A4C4F18C85E7122A1FB57604A277A1611F5BB3F17EC232BDFD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-CHS.exe</td><td class=\"sbody-td\">B7D5F75364BB00B6FB9C154909FB196D8A2B2798</td><td class=\"sbody-td\">3BD7FF8B22611EB0D800EBBDC73EBE7EF662B8C9BF2588B4621D204DDD4B5E9A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-CHT.exe</td><td class=\"sbody-td\">3446D6E08FAA46D79871A74D6CD64EF35B15E7B5</td><td class=\"sbody-td\">172A70E444CD31BBA886BE48B5E8ACE26E9321BB667175FEA078519EC87129CD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-DEU.exe</td><td class=\"sbody-td\">99579FCFDEB0D34F8F524FD05F67A05F317127FB</td><td class=\"sbody-td\">2E87CF924566DA32647CC60F39D0817AE80B113911847313A999621FC014899B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-ENU.exe</td><td class=\"sbody-td\">DB74FABC7F1F27D17F4875AA5CCBF86C69228E0C</td><td class=\"sbody-td\">8E14AF32FC79BBC4050AC40E5C7676D65D288F3B377F8D3C83F0B2BB9EA78A3F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-ESN.exe</td><td class=\"sbody-td\">74F138B20B5BB54F41614C71A3269CCE5336CD02</td><td class=\"sbody-td\">1732FDE5D45278DADD5EFC6BF122451F4453BA558132014D6FE39A60278E2BB6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-FRA.exe</td><td class=\"sbody-td\">8AF1399670271C1CA6030233D810B22F2647748C</td><td class=\"sbody-td\">9B7873B639A9E1A73A29084189BC91ED4CC0E03D490EAC3BA7A01E7F61A7B7F2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-ITA.exe</td><td class=\"sbody-td\">D8FEB4887F67D0B5CFB9E311D7BF798834A79F62</td><td class=\"sbody-td\">09BA23C5676C504AEA37466DE177230E55A7B1F9C70295F39035DB320C9195F8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-JPN.exe</td><td class=\"sbody-td\">D4884358B7A762194295BBE07E2FCF4938F50B44</td><td class=\"sbody-td\">6689B88AD8E67FFD2DD31C24E1651C9A7299A571AADB246ABA09C45BECCFE78B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-KOR.exe</td><td class=\"sbody-td\">5A3D463D02FACFF3F62B15DC4DFE1433C52BA39D</td><td class=\"sbody-td\">F78778F854CD1B251C723C77596FF22EBE85600EEE60A6FF14C12426A553A2A1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-PTB.exe</td><td class=\"sbody-td\">F2709A7CB563DE1F97E9D77F79D75E79E2E175A8</td><td class=\"sbody-td\">A73E5880D67CE2E2B5A9C32366C5FC68C9092B494FCB2F08D1093C640FDAD064</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x64-RUS.exe</td><td class=\"sbody-td\">86536FB175440DDD5B163EB4322DD5BD0F16A789</td><td class=\"sbody-td\">538287C0C238E09563CD50E00C557AF083E1910104508AA053D3B0C20A469D61</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-CHS.exe</td><td class=\"sbody-td\">A5D0468E63587B1F3E2C43A3FA606FE4B39465AE</td><td class=\"sbody-td\">B311D93A7EAD569EAAC2A25B33830444A4A300A7E0F08EFAACB31CB00696A3C2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-CHT.exe</td><td class=\"sbody-td\">D9C7DCAFB1BC9642F19BB62A6062A3B639754737</td><td class=\"sbody-td\">EA458EE289E01E72B3EFEEEF96252BF3903E2D499E9F6968499EF6F795C065F9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-CSY.exe</td><td class=\"sbody-td\">5199DFF4A1FC6F61883AE565C0A2666352850153</td><td class=\"sbody-td\">D3740968E0E92A7D019DF2BD391E48150899E5BE615C15578040FB25A9F49DEF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-DEU.exe</td><td class=\"sbody-td\">7BA7114A8B4191A5E28FAD08C758325BD10BEE3E</td><td class=\"sbody-td\">F67DE60AFA4B7CB3638E0A6046E09FA7701700C8CEB3BC910DCD8993ACEBFDCF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-ENU.exe</td><td class=\"sbody-td\">F5780DF5BB5680184D429C0E2491CBAA59782EFF</td><td class=\"sbody-td\">A2BE93DF3A44D951850991FB9A6C66C32A248C6D14A5CE9B203A9448F3A74FB6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-ESN.exe</td><td class=\"sbody-td\">C93DC1B38597E7BC3522B9A316E257B98AFF75FE</td><td class=\"sbody-td\">4337C50E004E722FD53D85C12534E938C3F99D1F2FA07C0A17B67533EFBE0187</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-FRA.exe</td><td class=\"sbody-td\">A466CAE7D5D7E6E5ADFFE4EAA2773D3228531D7C</td><td class=\"sbody-td\">8393E2F3E721131962C4F2E4E8C815AA499ECE0A848B7C0E6F2BA3AB67DC7F5A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-HUN.exe</td><td class=\"sbody-td\">3EB86481EFE82339513AFEAE6448739422BCC785</td><td class=\"sbody-td\">86689B3323324DCDC4E16AB33C2C566CC8FF983CC65A8488B657EEF691500568</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-ITA.exe</td><td class=\"sbody-td\">BDE69641821391EBA9B478ABDA7DB3A2CE1DA843</td><td class=\"sbody-td\">B11C0389A2DDC92E4A3952345CBFD147E315D1BE8132B422C374C808B3BDE37E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-JPN.exe</td><td class=\"sbody-td\">DF0A1973210C8D00B331E436B60BDC3BF4BF720D</td><td class=\"sbody-td\">1A33605A72C32B4026CCB0A537454499367821A950E8293C4CC96A7F766AB624</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-KOR.exe</td><td class=\"sbody-td\">1ACED25FBD41ADDE7B93A0F9E50A7E7D4ED05BDD</td><td class=\"sbody-td\">A01A8728C21D5B248DB989DCB231B3BA351578669900EDEF54F912C81795254A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-NLD.exe</td><td class=\"sbody-td\">0E7CCBDE7F17EB9E6E6BF1913C39A0B2E7FD0CDA</td><td class=\"sbody-td\">E30B460876DA7CBBFD904F82FE2A3FD0CB0461B63D1BA069E55C8E1194A15940</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-PLK.exe</td><td class=\"sbody-td\">B2974D75FB4B346C0B77E697BE70B2F569A6CD19</td><td class=\"sbody-td\">2E5BD9C9A2CABF73EE42371C307AB94F5FA797AD9F58C8C39C07979EFD520391</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-PTB.exe</td><td class=\"sbody-td\">DBC961BBBA27F8197D4FA4805A1C049E741809F2</td><td class=\"sbody-td\">49F2FF2B267A03CCE796323995C87ED8197A76C4337A990E8C440E930EF432D9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-PTG.exe</td><td class=\"sbody-td\">B6C8DD636F507D5A55D63FABBDC172F4C2F6FB33</td><td class=\"sbody-td\">0706141DC9D2EBB4F3BF39219E5511F2379C37BC3909213F2CD44BFA27038F23</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-RUS.exe</td><td class=\"sbody-td\">1F2033D06D6E73CFD86F1B8257662D9D4AD2C3E8</td><td class=\"sbody-td\">3B54885E65E67916C46B1257E1F956C5A270700EDAE3E474BA21656CAAB7CCA9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-SVE.exe</td><td class=\"sbody-td\">0DC807E813576BF5B3826C496938C9FA52C71D8A</td><td class=\"sbody-td\">C1193D50FA325284E3E515774F3EC749747FB7A59D42031A0F9C6207EF5A9A61</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3070102-x86-TRK.exe</td><td class=\"sbody-td\">3B1DFA452153E2A6819851248A1B04C2F209B033</td><td class=\"sbody-td\">8CED120C583CB3ECA3C5A5C0919AA4F936D206022CC8E06113603DC6965CA70D</td></tr></table></div></div><br/></span></div></div></div><a class=\"bookmark\" id=\"fileinfo\"></a><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File information<br/></span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"> <br/>The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.<br/><br/><br/><h3 class=\"sbody-h3\">Windows Server 2003 file information<br/></h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific milestone (SP<strong class=\"sbody-strong\">n</strong>) and service branch (QFE, GDR) are noted in the \"SP requirement\" and \"Service branch\" columns.</li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.</li><li>In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KB<strong class=\"sbody-strong\">number</strong>.cat) that is signed with a Microsoft digital signature.</li></ul><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">5.2.3790.5667</td><td class=\"sbody-td\">4,662,784</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">04:48</td><td class=\"sbody-td\">x64</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">5.2.3790.5667</td><td class=\"sbody-td\">1,894,400</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">04:25</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">5.2.3790.5667</td><td class=\"sbody-td\">5,688,832</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">04:48</td><td class=\"sbody-td\">IA-64</td></tr></table></div><h3 class=\"sbody-h3\">Windows Vista and Windows Server 2008 file information<br/></h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.0.600<span class=\"text-base\">2</span>.<span class=\"text-base\">18</span><strong class=\"sbody-strong\">xxx</strong></td><td class=\"sbody-td\">Windows Vista SP2 and Windows Server 2008 SP2</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.0.600<span class=\"text-base\">2</span>.<span class=\"text-base\">23</span><strong class=\"sbody-strong\">xxx</strong></td><td class=\"sbody-td\">Windows Vista SP2 and Windows Server 2008 SP2</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows Vista and Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.0.6002.19429</td><td class=\"sbody-td\">2,066,432</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">02:57</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.0.6002.23735</td><td class=\"sbody-td\">2,074,624</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">02:55</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows Vista and Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.0.6002.19429</td><td class=\"sbody-td\">2,796,032</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">03:09</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.0.6002.23735</td><td class=\"sbody-td\">2,798,592</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">03:26</td><td class=\"sbody-td\">x64</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.0.6002.19429</td><td class=\"sbody-td\">6,707,712</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">02:59</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.0.6002.23735</td><td class=\"sbody-td\">6,717,952</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">02:57</td><td class=\"sbody-td\">IA-64</td></tr></table></div><h3 class=\"sbody-h3\">Windows 7 and Windows Server 2008 R2 file information<br/></h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM, SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table: <br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.1.760<span class=\"text-base\">1</span>.<span class=\"text-base\">18</span>xxx</td><td class=\"sbody-td\">Windows 7 and Windows Server 2008 R2</td><td class=\"sbody-td\">SP1</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.1.760<span class=\"text-base\">1</span>.<span class=\"text-base\">22</span>xxx</td><td class=\"sbody-td\">Windows 7 and Windows Server 2008 R2</td><td class=\"sbody-td\">SP1</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 7</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.1.7601.18906</td><td class=\"sbody-td\">2,383,872</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">08:46</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.1.7601.23109</td><td class=\"sbody-td\">2,392,576</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">08:29</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 7 and Windows Server 2008 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.1.7601.18906</td><td class=\"sbody-td\">3,207,168</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">08:57</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.1.7601.23109</td><td class=\"sbody-td\">3,210,240</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">08:49</td><td class=\"sbody-td\">x64</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2008 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.1.7601.18906</td><td class=\"sbody-td\">7,505,920</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">08:17</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.1.7601.23109</td><td class=\"sbody-td\">7,513,088</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">08:06</td><td class=\"sbody-td\">IA-64</td></tr></table></div><h3 class=\"sbody-h3\">Windows 8 and Windows Server 2012 file information<br/></h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM,SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.2.920 <span class=\"text-base\">0.16</span> xxx</td><td class=\"sbody-td\">Windows 8 and Windows Server 2012</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.2.920 <span class=\"text-base\">0.20</span> xxx</td><td class=\"sbody-td\">Windows 8 and Windows Server 2012</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 8</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,172</td><td class=\"sbody-td\">11-Oct-2012</td><td class=\"sbody-td\">00:38</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.2.9200.17419</td><td class=\"sbody-td\">3,391,488</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">01:53</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,172</td><td class=\"sbody-td\">25-Jul-2012</td><td class=\"sbody-td\">20:33</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.2.9200.21528</td><td class=\"sbody-td\">3,378,688</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">01:59</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 8 and Windows Server 2012</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,172</td><td class=\"sbody-td\">11-Oct-2012</td><td class=\"sbody-td\">00:37</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.2.9200.17419</td><td class=\"sbody-td\">4,064,768</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">01:54</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,172</td><td class=\"sbody-td\">25-Jul-2012</td><td class=\"sbody-td\">20:29</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.2.9200.21528</td><td class=\"sbody-td\">4,062,208</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">01:58</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Wow64_win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,172</td><td class=\"sbody-td\">12-Feb-2013</td><td class=\"sbody-td\">00:14</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Wow64_win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,172</td><td class=\"sbody-td\">12-Feb-2013</td><td class=\"sbody-td\">00:09</td><td class=\"sbody-td\">Not applicable</td></tr></table></div><h3 class=\"sbody-h3\">Windows 8.1 and Windows Server 2012 R2 file information<br/></h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM,SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.3.920 <span class=\"text-base\">0.16</span> xxx</td><td class=\"sbody-td\">Windows 8.1 and Windows Server 2012 R2</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">GDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 8.1</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,213</td><td class=\"sbody-td\">21-Aug-2013</td><td class=\"sbody-td\">23:39</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.3.9600.17915</td><td class=\"sbody-td\">3,531,776</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">02:29</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 8.1 and Windows Server 2012 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,213</td><td class=\"sbody-td\">22-Aug-2013</td><td class=\"sbody-td\">06:44</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Win32k.sys</td><td class=\"sbody-td\">6.3.9600.17915</td><td class=\"sbody-td\">4,177,920</td><td class=\"sbody-td\">25-Jun-2015</td><td class=\"sbody-td\">02:31</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Wow64_win32k.ptxml</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">4,213</td><td class=\"sbody-td\">21-Aug-2013</td><td class=\"sbody-td\">23:39</td><td class=\"sbody-td\">Not applicable</td></tr></table></div></div><br/></div></div></div></div></div></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help for installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-18\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-19\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-20\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-21\" target=\"_self\">International Support</a></div><br/></span></div></div></div></div></body></html>", "edition": 2, "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "mskb", "title": "MS15-073: Vulnerabilities in Windows kernel-mode driver could allow elevation of privilege: July 14, 2015", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-2367", "CVE-2015-2365", "CVE-2015-2366", "CVE-2015-2363", "CVE-2015-2382", "CVE-2015-2381"], "modified": "2015-07-14T17:16:52", "id": "KB3070102", "href": "https://support.microsoft.com/en-us/help/3070102/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:40:57", "description": "<html><body><p>Resolves vulnerabilities in Windows that could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine that is hosted by Hyper-V.</p><h2>Summary</h2><div class=\"kb-summary-section section\">This security update resolves vulnerabilities in Windows that could allow remote code execution in a host context if a specially crafted application is run by an authenticated and privileged user on a guest virtual machine that is hosted by Hyper-V. An attacker must have valid logon credentials for a guest virtual machine to exploit this vulnerability. To learn more about the vulnerability, see\u00a0<a href=\"https://technet.microsoft.com/library/security/ms15-068\" id=\"kb-link-2\" target=\"_self\">Microsoft Security Bulletin MS15-068</a>. </div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><span class=\"text-base\">Important </span><ul class=\"sbody-free_list\"><li>All future security and nonsecurity updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update\u00a0<a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-3\" target=\"_self\">2919355</a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-4\" target=\"_self\">2919355</a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive future updates. </li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href=\"https://technet.microsoft.com/en-us/library/hh825699\" id=\"kb-link-5\" target=\"_self\">Add language packs to Windows</a>.<br/></li></ul></div><h2>More information about this security update</h2><div class=\"kb-moreinformation-section section\"><br/>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.<br/><ul class=\"sbody-free_list\"><li><a href=\"https://support.microsoft.com/help/3046359\" id=\"kb-link-6\" target=\"_self\">3046359</a> MS15-068: Description of the security update for Windows Hyper-V: July 14, 2015</li><li><a href=\"https://support.microsoft.com/help/3046339\" id=\"kb-link-7\" target=\"_self\">3046339</a> MS15-068: Description of the security update for Windows Hyper-V: July 14, 2015<br/></li></ul></div><h2>How to obtain and install the update</h2><div class=\"kb-resolution-section section\"><a class=\"bookmark\" id=\"obtaintheupdate\"></a><h3 class=\"sbody-h3\">Method 1: Windows Update</h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see <br/><a href=\"https://www.microsoft.com/security/pc-security/updates.aspx\" id=\"kb-link-9\" target=\"_self\">Get security updates automatically</a>.<br/><br/><span class=\"text-base\">Note</span> For Windows RT 8.1, this update is available through Windows Update only.</div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Method 2: Microsoft Download Center</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.<br/><br/>Click the download link in <a href=\"https://technet.microsoft.com/library/security/ms15-068\" id=\"kb-link-10\" target=\"_self\">Microsoft Security Bulletin MS15-068</a> that corresponds to the version of Windows that you are running. <br/> <br/><br/></div><br/></span></div></div></div></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Windows Server 2008 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3046359-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-11\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under Windows Update, click <span class=\"text-base\">View installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3046359\" id=\"kb-link-12\" target=\"_self\">Microsoft Knowledge Base Article 3046359</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 R2 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3046359-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-13\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then under Windows Update, click <span class=\"text-base\">View installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3046359\" id=\"kb-link-14\" target=\"_self\">Microsoft Knowledge Base Article 3046359</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 8 and Windows 8.1 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3046339-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3046359-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-15\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under See also, click <span class=\"text-base\">Installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3046359\" id=\"kb-link-16\" target=\"_self\">Microsoft Knowledge Base Article 3046359</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2012 and Windows Server 2012 R2 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB3046339-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB3046359-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB3046339-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB3046359-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-17\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under See also, click <span class=\"text-base\">Installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/3046359\" id=\"kb-link-18\" target=\"_self\">Microsoft Knowledge Base Article 3046359</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3046339-x64.msu</td><td class=\"sbody-td\">BE0C3EBAA0E857DD74AD76F10045359221A2780B</td><td class=\"sbody-td\">868D8D7D5DA0D8F93CFBCF3DB5F5A26C803085CBC4874FF1DA95D4265074CA7B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3046339-x64.msu</td><td class=\"sbody-td\">97A48BD2C7E72451B238AF1438D25AE288822012</td><td class=\"sbody-td\">3F1C5F0B83011FA58B9DDCB8EBA0E05A74CA5EA29A2640A0C9D7C9E6CF69249C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3046339-x64.msu</td><td class=\"sbody-td\">B24B39E3D681358A888945686B0F6DBFCBB94E1E</td><td class=\"sbody-td\">B2491F3C6689B9CC65602A0DF8C235E173D6A6D88088CAC492D45B348BE05DDB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3046359-x64.msu</td><td class=\"sbody-td\">55171DFE080DBA3F91414135D247AB151F42CB28</td><td class=\"sbody-td\">4AF3AE4D0C826BD633FF906CDCE873114FD48C7DFE8E87593489E35193245FF4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3046339-x64.msu</td><td class=\"sbody-td\">1DB8F366F714295FE0823F8B610623EDDA815A8B</td><td class=\"sbody-td\">B48934AD90D61480DD6C14ACAD9E0C0329B23DD288AD72E9226E9A83EC6CCB78</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help for installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-19\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-20\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-21\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-22\" target=\"_self\">International Support</a></div><br/></span></div></div></div></div></body></html>", "edition": 2, "published": "2015-07-14T00:00:00", "type": "mskb", "title": "MS15-068: Vulnerability in Windows Hyper-V could allow remote code execution: July 14, 2015", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-2362", "CVE-2015-2361"], "modified": "2015-07-14T17:22:48", "id": "KB3072000", "href": "https://support.microsoft.com/en-us/help/3072000/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:49:21", "description": "<html><body><h2>Summary</h2><div class=\"kb-summary-section section\">This security update resolves vulnerabilities in Microsoft Windows.\u00a0These vulnerabilities\u00a0could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user\u2019s current working directory. Then, the attacker convinces the user to open an .rtf file or to start a program that is designed to load a trusted DLL file. But instead, the program loads the attacker\u2019s specially crafted DLL file. An attacker who successfully exploited the vulnerabilities could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. To learn more about the vulnerability, see\u00a0<a href=\"https://technet.microsoft.com/library/security/MS15-069\" id=\"kb-link-1\" target=\"_self\">Microsoft Security Bulletin MS15-069</a>. </div><h2>More information</h2><div class=\"kb-moreinformation-section section\"><span class=\"text-base\">Important </span><ul class=\"sbody-free_list\"><li>All future security and nonsecurity updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update\u00a0<a href=\"https://support.microsoft.com/en-us/kb/2919355\" id=\"kb-link-2\" target=\"_self\">2919355</a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/kb/2919355\" id=\"kb-link-3\" target=\"_self\">2919355</a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive future updates. </li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href=\"https://technet.microsoft.com/en-us/library/hh825699\" id=\"kb-link-4\" target=\"_self\">Add language packs to Windows</a>.<br/></li></ul><div id=\"bookmark-fileinfo\"></div></div><h2>Additional information about this security update</h2><div class=\"kb-moreinformation-section section\"><br/>The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.<br/><ul class=\"sbody-free_list\"><li><a href=\"http://support.microsoft.com/kb/3067903\" id=\"kb-link-5\" target=\"_self\">3067903</a> MS15-069: Description of the security update for Windows: July 14, 2015</li><li><a href=\"http://support.microsoft.com/kb/3070738\" id=\"kb-link-6\" target=\"_self\">3070738</a> MS15-069: Description of the security update for Windows: July 14, 2015</li><li><a href=\"http://support.microsoft.com/kb/3061512\" id=\"kb-link-7\" target=\"_self\">3061512</a> MS15-069: Description of the security update for Windows: July 14, 2015</li></ul></div><h2>How to obtain and install the update</h2><div class=\"kb-resolution-section section\"><div id=\"bookmark-obtaintheupdate\"></div><h3 class=\"sbody-h3\">Method 1: Windows Update</h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see <br/><a href=\"https://www.microsoft.com/security/pc-security/updates.aspx\" id=\"kb-link-8\" target=\"_self\">Get security updates automatically</a>.<br/><br/><br/><br/><br/><span class=\"text-base\">Note</span> For Windows RT 8.1, this update is available through Windows Update only.<br/><br/></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Method 2: Microsoft Download Center</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.<br/><br/>Click the download link in <a href=\"https://technet.microsoft.com/library/security/MS15-069\" id=\"kb-link-9\" target=\"_self\">Microsoft Security Bulletin MS15-069</a> that corresponds to the version of Windows that you are running. <br/> <br/><br/></div><br/></span></div></div></div></div><h2>More information</h2><div class=\"kb-moreinformation-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Windows Server 2003 (all editions)<br/></h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\">Security update file names</td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3067903-x86-ENU.exe<br/>WindowsMedia11-KB3067903-x86-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3067903-x64-ENU.exe<br/>WindowsMedia11-KB3067903-x64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Installation switches</td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/kb/934307\" id=\"kb-link-10\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Update Log File</td><td class=\"sbody-td\">KB3067903.log</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Restart requirement</td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Removal information</td><td class=\"sbody-td\">Use <span class=\"text-base\">Add or Remove</span> Programs item in <span class=\"text-base\">Control Panel</span>, or use the Spuninst.exe utility that is located in the %Windir%\\$NTUninstallKB3067903$\\Spuninst folder.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">File information</td><td class=\"sbody-td\">See the file information section of the related Knowledge Base article that is mentioned in the\u00a0<a class=\"sbody-bookref\" href=\"\" id=\"kb-link-11\" location=\"bookmark-fileinfo\" scroll-to=\"\">Additional information about this security update</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Registry key verification</td><td class=\"sbody-td\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Updates\\Windows Server 2003\\SP3\\KB3067903\\Filelist</td></tr></table></div><h4 class=\"sbody-h4\">Windows Vista (all editions)<br/></h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3067903-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3067903-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/kb/934307\" id=\"kb-link-12\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstall of updates. To uninstall an update that is installed by WUSA, click\u00a0<span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the file information section of the related Knowledge Base article that is mentioned in the\u00a0<a class=\"sbody-bookref\" href=\"\" id=\"kb-link-13\" location=\"bookmark-fileinfo\" scroll-to=\"\">Additional information about this security update</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 (all editions)<br/></h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3067903-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3067903-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/kb/934307\" id=\"kb-link-14\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstall of updates. To uninstall an update that is installed by WUSA, click\u00a0<span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the file information section of the related Knowledge Base article that is mentioned in the\u00a0<a class=\"sbody-bookref\" href=\"\" id=\"kb-link-15\" location=\"bookmark-fileinfo\" scroll-to=\"\">Additional information about this security update</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 7 (all editions)<br/></h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3067903-x86.msu <br/>Windows6.1-KB3070738-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3067903-x64.msu<br/>Windows6.1-KB3070738-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/kb/934307\" id=\"kb-link-16\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">This update does not require a restart. The installer stops the required services, applies the update, and then restarts the services. However, if the required services cannot be stopped for any reason, or if required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the\u00a0<span class=\"text-base\">/Uninstall</span>\u00a0setup switch. Or, click\u00a0<span class=\"text-base\">Control Panel</span>, and then click\u00a0<span class=\"text-base\">System and Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click\u00a0<span class=\"text-base\">View installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the file information section of the related Knowledge Base article that is mentioned in the\u00a0<a class=\"sbody-bookref\" href=\"\" id=\"kb-link-17\" location=\"bookmark-fileinfo\" scroll-to=\"\">Additional information about this security update</a> section.<br/></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 R2 (all editions)<br/></h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3067903-x64.msu<br/>Windows6.1-KB3070738-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/kb/934307\" id=\"kb-link-18\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">This update does not require a restart. The installer stops the required services, applies the update, and then restarts the services. However, if the required services cannot be stopped for any reason, or if required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the\u00a0<span class=\"text-base\">/Uninstall</span>\u00a0setup switch. Or, click\u00a0<span class=\"text-base\">Control Panel</span>, and then click\u00a0<span class=\"text-base\">System and Security</span>. Under\u00a0<strong class=\"uiterm\">Windows Update</strong>, click\u00a0<span class=\"text-base\">View installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the file information section of the related Knowledge Base article\u00a0that is mentioned in the\u00a0<a class=\"sbody-bookref\" href=\"\" id=\"kb-link-19\" location=\"bookmark-fileinfo\" scroll-to=\"\">Additional information about this security update</a> section.<br/></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 8.1 (all editions)<br/></h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3061512-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3061512-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/kb/934307\" id=\"kb-link-20\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">This update does not require a restart. The installer stops the required services, applies the update, and then restarts the services. However, if the required services cannot be stopped for any reason, or if required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the\u00a0<span class=\"text-base\">/Uninstall</span>\u00a0setup switch. Or, click\u00a0<span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then click\u00a0<span class=\"text-base\">Windows Update</span>. Under <strong class=\"uiterm\">See also</strong>, click\u00a0<span class=\"text-base\">Installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the file information section of the related Knowledge Base article that is mentionedin the\u00a0<a class=\"sbody-bookref\" href=\"\" id=\"kb-link-21\" location=\"bookmark-fileinfo\" scroll-to=\"\">Additional information about this security update</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2012 and Windows Server 2012 R2 (all editions)<br/></h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB3061512-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/kb/934307\" id=\"kb-link-22\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">This update does not require a restart. The installer stops the required services, applies the update, and then restarts the services. However, if the required services cannot be stopped for any reason, or if required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that is installed by WUSA, use the\u00a0<span class=\"text-base\">/Uninstall</span>\u00a0setup switch. Or, click\u00a0<span class=\"text-base\">Control Panel</span>, click\u00a0<span class=\"text-base\">System and Security</span>, and then click\u00a0<span class=\"text-base\">Windows Update</span>. Under\u00a0<strong class=\"uiterm\">See also</strong>, click\u00a0<span class=\"text-base\">Installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the file information section of the related Knowledge Base article that is mentioned in the\u00a0<a class=\"sbody-bookref\" href=\"\" id=\"kb-link-23\" location=\"bookmark-fileinfo\" scroll-to=\"\">Additional information about this security update</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows RT 8.1 (all editions)<br/></h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Deployment</span></td><td class=\"sbody-td\">RT updates are available through <a href=\"http://go.microsoft.com/fwlink/?LinkId=21130\" id=\"kb-link-24\" target=\"_self\">Windows Update</a> only.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart Requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal Information</span></td><td class=\"sbody-td\">Click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then click\u00a0<span class=\"text-base\">Windows Update</span>. Under <strong class=\"uiterm\">See also</strong>, click\u00a0<span class=\"text-base\">Installed updates</span>, and then select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File Information</span></td><td class=\"sbody-td\">See the file information section of the related Knowledge Base article that is mentioned in the\u00a0<a class=\"sbody-bookref\" href=\"\" id=\"kb-link-25\" location=\"bookmark-fileinfo\" scroll-to=\"\">Additional information about this security update</a> section.</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3067903-x64.msu</td><td class=\"sbody-td\">F0331877795BC88BCD4AAB378718EE62C2536428</td><td class=\"sbody-td\">DA421815AFA7B5A9DA0E7336790C941BFB929E6B865107DC14AC8398FFC963B5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3067903-x86.msu</td><td class=\"sbody-td\">4057F85371BB77B4C0F9C27CDC05AA8929CD6846</td><td class=\"sbody-td\">14033E6D8131E432BEE10FE9AF9F635F2D71858AF71D666CF90A09E51A14EA19</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3067903-x64.msu</td><td class=\"sbody-td\">32ADE96FC5CA8915C044307A24AAFF2415931708</td><td class=\"sbody-td\">F5F66AE98BF5A668141456CF23DF27DB4ED97D4F546FA519E49571BBAAB750F4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3067903-x86.msu</td><td class=\"sbody-td\">DA835B25F8FC030E272B8B20A6381FC1167B28D0</td><td class=\"sbody-td\">BFFFEDA60540CC54D273AD911C9E274036AE908D32D7B48BB81D873B64C61C41</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3070738-x64.msu</td><td class=\"sbody-td\">D025081D2AC4AF608FCDC29CADE03BB3901B66DA</td><td class=\"sbody-td\">99D35AF248AA19350FDA7D912A0D941964D7B016F1E336D3DFC07C9E8089B89E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3070738-x86.msu</td><td class=\"sbody-td\">93F2E71A0839AAAA39E3A357261D2AD5727BF19E</td><td class=\"sbody-td\">FFB1F43CF309BB6135D209C5AE4B6FD56CAC0CE74BA4D5678D04801158AFC523</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3061512-arm.msu</td><td class=\"sbody-td\">A7BCE107FB09DA38ADBE76780AA5FD51FE1CB670</td><td class=\"sbody-td\">2852FE7F7E1B3CB4492CBC8814AE2C0223DB391B59CBEBCDA5E7BA352FBE0A9A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3061512-x64.msu</td><td class=\"sbody-td\">86B6CD6C5E0EA5670CA37AA97E335653E5A877FC</td><td class=\"sbody-td\">B6C8112A105BD62DEECADE35D2303AC4101E952353581A19664BB38F18878B45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3061512-x86.msu</td><td class=\"sbody-td\">ADE90472CAA876574943C3DA22F055A64753A261</td><td class=\"sbody-td\">D6BF0F67059B44C32C693C0C14CB428B438699DFC5787F534D29F4E545D3036A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-CHS.exe</td><td class=\"sbody-td\">A64A1DD1D93E72ECAD363B542CC679F88B36D807</td><td class=\"sbody-td\">DDDA22DC0FC0AABCB36EACF10BE6D6515B650670173775D35E32CBDA654C4E12</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-CHT.exe</td><td class=\"sbody-td\">C4FCE51E0C87620B003B719B79708B0BFF56B262</td><td class=\"sbody-td\">071EFF2B0FB67E43A92BAC7A8A534208AB8E9F0A2C51AAEC1557ACE80F172180</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-CSY.exe</td><td class=\"sbody-td\">2216F497C6F3497CBB8434F45279667F010FA5C1</td><td class=\"sbody-td\">63F29C0B4C8940E37C954CD9DD60F6EF34A5D555A757FDA9E170F6CB836F4E39</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-DEU.exe</td><td class=\"sbody-td\">FB7672037951089B91E3BF85EE44760068FD4F64</td><td class=\"sbody-td\">E6F2188ECDA0A5A16119F4CBB8BCB1E78E424891535B544FAFA823A8C0FD4A2C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-ENU.exe</td><td class=\"sbody-td\">FF84CB53BA0E0E5E1889C7C4C8D99777F6B98B84</td><td class=\"sbody-td\">7DE9C02D21FE8946524B480697AB6D9E3C019580528DBCC67F97A48D585F6EF5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-ESN.exe</td><td class=\"sbody-td\">A8890A1690901B6F0B43D419DDC4E4B2227D2FEE</td><td class=\"sbody-td\">A53D73DF60ECA5D9444B281C13A3913F977FD57F727740829BC1A1F654548E98</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-FRA.exe</td><td class=\"sbody-td\">744E3BA3AFDBACEEBDA58C4F2DBD0A52802F8834</td><td class=\"sbody-td\">8FF1BCCDA16382E8B25132980F0EB39927C5A4993069776D65BBB1B8319A35E0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-HUN.exe</td><td class=\"sbody-td\">3351D619A12AF425271FA2B40CF78018C35429ED</td><td class=\"sbody-td\">53DA9E613C9749D829942A172720E2F9517DE3FE1FC9E2D1F3869C35E6A366B6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-ITA.exe</td><td class=\"sbody-td\">1A638C64440C9A9EE7E5449F5A075647FB999B81</td><td class=\"sbody-td\">663702352B4D37D56693859569A3A9F05FDDC04785179FF16A236D22F0A319FD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-JPN.exe</td><td class=\"sbody-td\">B6D7460471D10D8DD6F2C707BDA843B8A7920C3B</td><td class=\"sbody-td\">F73EF7E13DB93822DD6666A3D9EB9615C55742A2104E61A5C45A25D8E19D0A9C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-KOR.exe</td><td class=\"sbody-td\">A78B73ECA93C06E37B8A543C55547C4F60BE1F79</td><td class=\"sbody-td\">7A479BA60D34B913D09C9E8B3523AF1B59A34DAED05B0BCF723DB7C4E8D3F95C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-NLD.exe</td><td class=\"sbody-td\">81F810C43532586F05DAAAE96976E4D8E00BF074</td><td class=\"sbody-td\">E0A63E022FA8525DE229CFFF5DD6F40D2620AD0E81549DB00A6F13F52794B4C8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-NOR.exe</td><td class=\"sbody-td\">71FFF988C9B74959D888632F7ED8B215BDB8C3EB</td><td class=\"sbody-td\">F1C26125C5ACC7332157A481C8FC6418F296547F05CD6BEB2B8ACE7BD29C3FCD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x64-SVE.exe</td><td class=\"sbody-td\">6BB137084F69E3685506A8C1D4BDBEA66017F6B3</td><td class=\"sbody-td\">4B99E1C58AF3C158C7AE2FCC3DB064797F54F43BF6C7627C07359D7CAD05A0B8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-CHS.exe</td><td class=\"sbody-td\">0DDD7CD2ADB3CE7F65A72E5DFB3E62EAB9A294BA</td><td class=\"sbody-td\">A0DB27F4BAD675481A7802555F497DA4CE7B2A64D21E45BCBD3D2DF42DE2C72F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-CHT.exe</td><td class=\"sbody-td\">B7A16C5D13E722EABA0138FA8C5897FFAF0A40ED</td><td class=\"sbody-td\">C4EE883BF0452BA00C3241D920738E34816A0BA88E6866968C853BA4EC578471</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-CSY.exe</td><td class=\"sbody-td\">B7EF5F80E65D477B2385C05EDDC783674BE54C9E</td><td class=\"sbody-td\">08D345A45CA38EE43531EE244831500EF78E93066214C095AED73567040A96C9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-DEU.exe</td><td class=\"sbody-td\">B022C07CE1C306416CACD55CF64B5677B87B8DF0</td><td class=\"sbody-td\">DFA4ABF2F43BD4927215D6796604A02389F77D50225DC808D15210C0DF7C41DB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-ENU.exe</td><td class=\"sbody-td\">21A4339CB85771FD71C30AB9EB97F12A62409C38</td><td class=\"sbody-td\">7BAB5454A4541B83148F32FAE4A1F6759C22DCEA4B79FC7198AB3B583E450A68</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-ESN.exe</td><td class=\"sbody-td\">0C94A8CE01B7E484C6249A11CDF126AD33F25B1B</td><td class=\"sbody-td\">672444A84611D43007C013F1A97AB942E09139BA9968BCDC3451634BE6B04C14</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-FRA.exe</td><td class=\"sbody-td\">5D63C7512CC95C36CCADE7012034E643742AA929</td><td class=\"sbody-td\">021599CAAE98F5069732070CAD704B27272D7DB3C30C5BD5F5D9F0C5CD6309A4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-HUN.exe</td><td class=\"sbody-td\">5FDA0362493CDCCBD9972265E0BADF232A880659</td><td class=\"sbody-td\">E182E0C5DFF75F58117834CCC93F22C2901B6C64B0D815A82FC882A37413E055</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-ITA.exe</td><td class=\"sbody-td\">E2EFB2C623B33DA52F2FC4118380093C5E9676F2</td><td class=\"sbody-td\">3994F01FA4E41907A40031B02E2CD8063ACD8A10925AB0E3BE67EF098EC146F0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-JPN.exe</td><td class=\"sbody-td\">F9716B02C38778478977E651BEBEAC7AC15F3D36</td><td class=\"sbody-td\">B42D1FC20308C2F33211D72766A189823DEB8889AC0F8CD19BDCE864CA9A911F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-KOR.exe</td><td class=\"sbody-td\">EED37233E0BF4DD237B208A576F2E8CAC0318DFA</td><td class=\"sbody-td\">3CC8771A9538B7ABE3E0A8682E428485F8A71F3858C3FB6A99B87713D3F40641</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-NLD.exe</td><td class=\"sbody-td\">41F6E3278A2C8786D06629A02D9B61AF8F5EFAF7</td><td class=\"sbody-td\">11699812465AB2746A5DE41C01A2C868C07D8F8AD685AB471037B332437A6FEB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-NOR.exe</td><td class=\"sbody-td\">F2165DEE8109F09081232CA2BE7ED85F96411EF5</td><td class=\"sbody-td\">D2FFD9E17A8EA9586382CE4D785915E70435E2896E063F05AFE5BFDA42FE9D1B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia11-KB3067903-x86-SVE.exe</td><td class=\"sbody-td\">DE577A4214B00AE92A0A15F032484336AA9B1DB9</td><td class=\"sbody-td\">DC210B7498ED314007DB8B8BDD4CDC601E97292340EC784C36AFE9D4A44EEAE3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-ARA.exe</td><td class=\"sbody-td\">39DA0CB14E9AAF9F9BC87C666052156775B1DF65</td><td class=\"sbody-td\">E4D954E2155DF9F465C62EB743CD42F294500A9E61D6A29C24527FC21614127A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-CHS.exe</td><td class=\"sbody-td\">CCB48811C7CD12D19B9FD27BACF4FB3BE9577379</td><td class=\"sbody-td\">C734A96D15D74EF8639DB9AD76A660FC3CD32307A9B7345CDAB75CB102925146</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-CHT.exe</td><td class=\"sbody-td\">2CDA68ACCC85184A16CA1B16B7AFADEDEA99505E</td><td class=\"sbody-td\">B80D266D39199D4CAEB69CAFFB3B550B8A568CDF3CFC7689AB6FCB8A49F1B583</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-CSY.exe</td><td class=\"sbody-td\">CC487343F2DD18A32E4BC14ACE83FFAC31D1D523</td><td class=\"sbody-td\">95792662FF33B548CADAE2E854AC799F5F79945824A5C0B5C2A61CF13FA7687A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-DAN.exe</td><td class=\"sbody-td\">8D7D8AEAF1CEC928793AB34854BCDECCEA00402A</td><td class=\"sbody-td\">A66685235F1472B4B68137D6071797514657D555F5B8EA479832161BFB3C3B9E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-DEU.exe</td><td class=\"sbody-td\">112E6648DAD4183B9372924A72BF6C5E822B465B</td><td class=\"sbody-td\">1CEEC91F9A69DCD9E3BAD79B730582F3FBCF86F8B23EA52629F7362489E06A83</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-ELL.exe</td><td class=\"sbody-td\">71411239CAB9EE72F6A98F1E2EE48B8CD95A8D73</td><td class=\"sbody-td\">4D58481F41B937FF3108D0BDB5D2AE9C118BA3FB9F49470A087FD5E29B5A3EE9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-ENU.exe</td><td class=\"sbody-td\">88EA0545B0CF554B0B320E56752F9939BC3F3F1A</td><td class=\"sbody-td\">32B5A03E74FB422C5D2E17C0D922AC0BA592A3AB85D35758E4AA29926E6A5F4D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-ESN.exe</td><td class=\"sbody-td\">42E6C5BAAB05DEFC6B0D7B0C9F5AFF6C7C7857DD</td><td class=\"sbody-td\">D2C03811E14911DEF87EE1915248A8042434AAA42BA7628B971FA62301B33E99</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-FIN.exe</td><td class=\"sbody-td\">7DF876845D609EAEC29722D48975EB3EEF2C58C6</td><td class=\"sbody-td\">A5C90FFE37009320BA028D7736060092AB6F3B5521AF71FB0FEA9D6829989DDF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-FRA.exe</td><td class=\"sbody-td\">884FEF0A7DAAD1F13D721A05921DBE7EF32CA3B1</td><td class=\"sbody-td\">62A0E78633A70E24BD4965C77272583CA06A28D6CCCE3BDA9FD2A6DB80E165D0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-HEB.exe</td><td class=\"sbody-td\">317307BCCB0DCE9899D8C1870ACE6D9502011D03</td><td class=\"sbody-td\">09CB2138FCEA5F369974165008E460303F79F17349E0304CA0812F4DF54E3C99</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-HUN.exe</td><td class=\"sbody-td\">755689B6088F1D0CA29CFFD3FD94F40511824977</td><td class=\"sbody-td\">9D5988893E2E8B5FEF51C20B48F96BDD7EF302F659417FEB3EE5A55712AAC6DA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-ITA.exe</td><td class=\"sbody-td\">B7864DC1A9A06020DBD8C2EE0990F96308EBA88C</td><td class=\"sbody-td\">3EECB949CCCB2C3F0FBEAB2A1BF6BA36FB99ECD9F7CDBA958C5F4952FA96B4FA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-JPN.exe</td><td class=\"sbody-td\">609D86293817700495897E7ADB9D030C783E7F60</td><td class=\"sbody-td\">B8FC408C55D9C4D6730AB0293DEAD864F709B3CB06A6BA808C2781417E3FADCB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-KOR.exe</td><td class=\"sbody-td\">FCD0061D94A46AA1746F8C846782BC13A4D1C66F</td><td class=\"sbody-td\">72DF5F871B3C7E32742423385EC571494957B1CFE068F643D13E7ED9BEAE8621</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-NLD.exe</td><td class=\"sbody-td\">F499D488AA7C12A655E515DC7EF47AA3A768586D</td><td class=\"sbody-td\">408CFC0A81F18725B2458CB1266571275B68A814E542C591000C8E81F23D74CB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-NOR.exe</td><td class=\"sbody-td\">4968E281855B9163EC8FD05AE67DF8470235E6BC</td><td class=\"sbody-td\">108BF018F7342F8201884ECE80BBFA50E6E885183EEF96251C09D55002D564BA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-PLK.exe</td><td class=\"sbody-td\">60DCAFF0FBAC21CDBB1F1E5A95D71AFDC2C9B9A7</td><td class=\"sbody-td\">F4D9EDD6B43E0CD25547082BCB5D445C9DF8672102F63D318B77B3E89824D6A1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-PTB.exe</td><td class=\"sbody-td\">F12B69AA11553374327AC40C848CFA3C6D891FA5</td><td class=\"sbody-td\">3773B9588E454BFBC3350130EF865BB1C116E345DA53015278E41423FD373C8B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-PTG.exe</td><td class=\"sbody-td\">EDC47C72C5B1665BAB4339FDD3007B21B255E8D0</td><td class=\"sbody-td\">DDB1B17B66FF9CDF9191741AC12A0704C7AA9915F009C4C3286425CADC0FEF48</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-RUS.exe</td><td class=\"sbody-td\">B9CA24ECAD641FF0D7441757C25EB3CB38D3B60C</td><td class=\"sbody-td\">DF6B42570165900CC621E1B3C952BBCEAA596CEBD489261E34EF928B36AB4F2E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-SVE.exe</td><td class=\"sbody-td\">F771A1FF53E54BC694BEE6D1EF5DFBF79B1F3AB6</td><td class=\"sbody-td\">83AFAFFC5B5FF07864C7F41AB17A2A3BC1854A0490C90A9E4B142D4FB88C97DF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x64-TRK.exe</td><td class=\"sbody-td\">C873B3EB5A526F55EF176FFC1EF3B15D75DA1622</td><td class=\"sbody-td\">C54B9335B5CCE8B43E24D9D34FE2C7DE959902ED46D74113519325B925AA3F68</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ARA.exe</td><td class=\"sbody-td\">2A295193ABC663753A678B5DCC424105A94EAE6F</td><td class=\"sbody-td\">4D5755A545482A1EC6AC0F1ABB6BBE646EF4F9F6DD795F251E3FFD67DBE1FAA3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ARA.exe</td><td class=\"sbody-td\">9065116060D31D96E4F4DD7AE6FE5455CC670E06</td><td class=\"sbody-td\">7147591DAC67D5AADF0DDC2CF79979CF29B04A46E90B7ABAB3F9985557169687</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ARA.exe</td><td class=\"sbody-td\">F84FECB6516C0C772FC2391C5D47B0D1826C157A</td><td class=\"sbody-td\">2CAFFBDD37FC45E159038DEAAD4E3CB53995B42AF3EECB776FF3A22DF7ED0657</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CHS.exe</td><td class=\"sbody-td\">130397956C7A286680745BBB31F81AC7AA3D2D1B</td><td class=\"sbody-td\">06C5A09B8BBB9AF93F05D1D2C0916DD140F2E52FEB4391DB8FBCB88D4DDA9622</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CHS.exe</td><td class=\"sbody-td\">2421401770F287AD753871E504A824BA0B4703C9</td><td class=\"sbody-td\">DED72D073A33C3A4DF3CB42904C652011E83EA88A04D3446EAF3BBC79157FB10</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CHS.exe</td><td class=\"sbody-td\">E16F020C7E261F3169DB7FABD1683E7696F5CE8D</td><td class=\"sbody-td\">E48513C1C40BB53E2A231E2FB06B0C432494815E4316DB9CF8CBB94C635F88C6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CHT.exe</td><td class=\"sbody-td\">035426095F7C2CB4A06EB8CA0CFDD6EA4881D76B</td><td class=\"sbody-td\">EE6793571DED1761F4AAACC832AD4471E56C6D1DC554E35EFDC69114ED1C730F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CHT.exe</td><td class=\"sbody-td\">2A0CCDDE6B46939CD25C7663CA9A3B885370290C</td><td class=\"sbody-td\">6CFDF44CCC01D90BEBBA1BA52CC8887F6A9B13372C67EC096A2D9E39D550EA5D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CHT.exe</td><td class=\"sbody-td\">DAE0DA72AE6E1C07C03E5FC6E99567517692481F</td><td class=\"sbody-td\">A04E9BDEE1F7FAB4D32FD14CD5924E6E43564DDF893EB19F52CF28B2CFAB3511</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CSY.exe</td><td class=\"sbody-td\">69F8CA4463305C3AC70C56E38B2514D642B384FD</td><td class=\"sbody-td\">A82BAB3AD6A0EE0E2EC1804740D09EA17E17B79BA68F45723B87414E05417543</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CSY.exe</td><td class=\"sbody-td\">CC54FADA2148DB117E1457434C8BB362502B27FF</td><td class=\"sbody-td\">782A6756308D14A1170DEAF583B1906AEC150C8597AFCD05C0A82C3AB1F300DB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-CSY.exe</td><td class=\"sbody-td\">FB92B7D4CCDA716AB106D160FCF89C2C3D806A76</td><td class=\"sbody-td\">EE5D14F46D93C91BDD5DC9411B7005A40AD26F28C06D95B4366924B12B894276</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-DAN.exe</td><td class=\"sbody-td\">0E0AE48EA772DD89186C1924FEB012D367419D79</td><td class=\"sbody-td\">0E63F0593C04B6D769437B7FAA93FCBA50D54E48D9E1A31045CDD89F7AC099B1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-DAN.exe</td><td class=\"sbody-td\">86AA99C2C80F9BABFF06A73A076E163EDD054DF1</td><td class=\"sbody-td\">D9E9C7C0E05B0D340963F77F44C2EF7C060FEEE142C0E1F86490791328535C56</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-DAN.exe</td><td class=\"sbody-td\">DEC22E89C69225248C11A7EBCA1C5A2CE04A1413</td><td class=\"sbody-td\">19327C2BF78CF05CFBE37DEB568B5FD7CD7B97C667C1F329ABD9F0E478E9E3D6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-DEU.exe</td><td class=\"sbody-td\">35333BA38DF2A8B2D3D43F9946B5B58F6E8FF4BF</td><td class=\"sbody-td\">D791AF791745C16F8C47C29CCD9A5215188EC057AF5443EC4561D47D251D51FF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-DEU.exe</td><td class=\"sbody-td\">C52015EDDA6FE4A50417B92807562B6D65F1EEA5</td><td class=\"sbody-td\">E6A08473CCFBA04A41E675D2F30174D2C843EADB7711B63B28E39E05B39BD77D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-DEU.exe</td><td class=\"sbody-td\">D52C6D232498D52841FD3F230321156F2B900014</td><td class=\"sbody-td\">7DBFCAD4B4C4F2F80E2F4EA3244986142A69D6FA82372046902DE5A2DDAC25E7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ELL.exe</td><td class=\"sbody-td\">7539D27107EB883C0DBC45BE6E9DFB869F9710A1</td><td class=\"sbody-td\">872A371C9176C47B04A0BEBE447D57B3D3D5469CE2414C5EEF78ECDABC43DFCD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ELL.exe</td><td class=\"sbody-td\">AF3EADFA0B03EDE2483CF8FE06E8A23689EBBA95</td><td class=\"sbody-td\">96D8D1C68E4A34A9210C8687A0930BD59B4D9F58A7FD824BF758B91E1FAD2C45</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ELL.exe</td><td class=\"sbody-td\">E0DF3D3930998FD6C4FA7BE2BEA342020A7C025D</td><td class=\"sbody-td\">3029074FFD6A18C1B1181FF4A24F63940DF381B4A23CE43F6DE2F9B319481143</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ENU.exe</td><td class=\"sbody-td\">17CADD59515063D00D9F0D92D023AE1AA2349E4E</td><td class=\"sbody-td\">B3D81E216336B842FF3BB3919353D819494C9EE3047ED617E03B4C3456314B24</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ENU.exe</td><td class=\"sbody-td\">1DCE8EC95FE6BD91EACF10514B49447D3D889268</td><td class=\"sbody-td\">1A20DEE49A2859DE5F3B0A27B1A78F5DCFCFE1AC6AFAEDD3BDC4671D4892751D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ENU.exe</td><td class=\"sbody-td\">510155E48BFC1C08E7F2023FDE514BE960FA8FED</td><td class=\"sbody-td\">565CBB682AE1B8290C44989A2D7BFD6CBB342955D2715EDBCE2797FF64E14F6A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ESN.exe</td><td class=\"sbody-td\">5CC4A2D4840BEFA1C31289FCD02BD8EA848CCFD6</td><td class=\"sbody-td\">293BCC1B38079C6602E68FAEFE8C96A045EACF6E4650B0B75A4BD4E59A897218</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ESN.exe</td><td class=\"sbody-td\">5E3F0ACABFE594ABB29B44E111107E987C81D70B</td><td class=\"sbody-td\">3E98DDD028445C221356EE43473CB7190F5A19A7106FC2E3C5A4DE9C65FB3B3E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ESN.exe</td><td class=\"sbody-td\">9C06AC813538CD855A5B1F1C741D6CCE34474F56</td><td class=\"sbody-td\">852F25BA593E8B4122643311F33344147754A2FAE051DB6C709F2CAC479ADFEF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-FIN.exe</td><td class=\"sbody-td\">34B086B0BC705E1F14DEE2747DD78220858099E7</td><td class=\"sbody-td\">5C8F92CAA8551CC81114633C195798F7290347E32EC523A3CD4E345A7E32709F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-FIN.exe</td><td class=\"sbody-td\">38844BE276795814A751EC48532A7B105A7486DB</td><td class=\"sbody-td\">E5BD5C6E7A4A510D2BA23F7CA08D3EBD99B0BE7567C1807D23CDAFDDBC524EFE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-FIN.exe</td><td class=\"sbody-td\">8136E150872EBEAB67B43536287A74599052F797</td><td class=\"sbody-td\">EDA0E3CFCF9718EAC61589B2A77F50A85CBC00D78496116492B4C4905280175C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-FRA.exe</td><td class=\"sbody-td\">2306BA9F5371C61F0FA5622ADA02F05113A797B8</td><td class=\"sbody-td\">96698B4F4E5E20B1456C80844099EC92CF69808A3836D4FFADF6C440525005EB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-FRA.exe</td><td class=\"sbody-td\">5025FC6940832EAC4110166589B036745A524C05</td><td class=\"sbody-td\">F6BEA2D52BE92B990FF68CFA5B8BF5B71C59AB7E4F8C0E48B2EF4A8076547EF1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-FRA.exe</td><td class=\"sbody-td\">9FEF3AE7236A8D6642C51D5EFCFEB3AEB70558C3</td><td class=\"sbody-td\">033E134218C186C105565AF2E52852AC7597901919791A45AD6B2D99658AAA9E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-HEB.exe</td><td class=\"sbody-td\">18599796C995D9661E3DC9282AC910730D58125E</td><td class=\"sbody-td\">FD4606CA440C07F792F827C99CFAFC71D170EB39570AF8F6E9A9CF8FA936A388</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-HEB.exe</td><td class=\"sbody-td\">4ACF848C3E8C1B6C9BF0A78B0B50193E8AF0DD5D</td><td class=\"sbody-td\">AF0C887549E105BC7FBA961E01C660D757671A4DFEC58B52C8EF80194E8A3053</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-HEB.exe</td><td class=\"sbody-td\">DB8B6029C753C2DD83E85704A1497F8CA3134D0B</td><td class=\"sbody-td\">752C0F1D13ECF7EEEB61E5F77F574DE3D82BC8A36D6365D1743DBBF31F91C841</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-HUN.exe</td><td class=\"sbody-td\">C02E3A8C10356B8D37A7355C2A225DAB51FE7598</td><td class=\"sbody-td\">DFADA6AB39DB6AA98098B52D5DB8E3E3B9953CAE137DF7C54351AFDD9055905D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-HUN.exe</td><td class=\"sbody-td\">CF23B672EA4A6BF9A2813EF6535F47F0CD18F865</td><td class=\"sbody-td\">3C11846C68BEC609343DF71B866802C7A2BD78ADA9F426FEFC11E9D6307D1387</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-HUN.exe</td><td class=\"sbody-td\">F0C16EEE976CAF7DF5FBEFC9D2E249247AAC7789</td><td class=\"sbody-td\">04B648B35F86FC25127F15D74514A623B2632C75B015D99B7FFCD41E50EB574A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ITA.exe</td><td class=\"sbody-td\">186F426E50446487562F04AC4D821AD53F9F78D6</td><td class=\"sbody-td\">4E9C21E6428BE4D923E7BF39970E8D1682D98F3DFA86530289BAA0BD86C2A2BB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ITA.exe</td><td class=\"sbody-td\">BE9C164B8F7D90E6649B2C6C808B050D42744D8F</td><td class=\"sbody-td\">356DC0B41A6AB087E0F962144BAADF0DE6A08C8D0EEBF85C6691F660C5BB4697</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-ITA.exe</td><td class=\"sbody-td\">C817ECF4AAA429F5A27F7D37700CD597D8D17A47</td><td class=\"sbody-td\">AF516BA3DBAE8BEFE2B4175C62E8759DB229212B50D442E6BA14AF8B2D2D2E08</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-JPN.exe</td><td class=\"sbody-td\">287E7C69298998A6378B1C845C472B66FBBF96AC</td><td class=\"sbody-td\">8203E31FFC88D9B5EE1664EB4D652B915CD123AA0209618555AD60E696319DFF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-JPN.exe</td><td class=\"sbody-td\">BA1356E1731182A86B787F31C3C68426F11421D0</td><td class=\"sbody-td\">D682774E9B8A3E3BE799861C4CF123EF2428168AA0F4FCC52239CA0B21C69870</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-JPN.exe</td><td class=\"sbody-td\">BF788313255A0138B7909F71FAEADE31ED723087</td><td class=\"sbody-td\">0AF4639FFCB04403BAB521A4454C60055A850D14E259E9B301BD52F3B20A0B20</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-KOR.exe</td><td class=\"sbody-td\">35765CCEF1B35DBBD3A1162A735C10473AE9900A</td><td class=\"sbody-td\">4FB225455EC7CB326122F67D047F85DA1581133C461AF5243CDEFDEA7F0731E0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-KOR.exe</td><td class=\"sbody-td\">992D0B17DA4427E4BE1D5F39BC79184C3EA55D24</td><td class=\"sbody-td\">64593A3CCE010291318A73E2FC6E3FE60D68D30C349A0CC8609808E500AC9AAB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-KOR.exe</td><td class=\"sbody-td\">F0515452435EC63EE902B88E2FE1236E4D441401</td><td class=\"sbody-td\">B1FAEA6D424B544F5A93CD7A31CFBE24D25D5382C4850233379E57BCB70A7BAC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-NLD.exe</td><td class=\"sbody-td\">200262F41766E1D4C9BD9E455CAA388042647076</td><td class=\"sbody-td\">13665EBC173DBA61AD92979A863F660E76DAB8B5C878E4D28FE69DD22F0B4630</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-NLD.exe</td><td class=\"sbody-td\">648F96B102851F34C321D5DDD3F76DB4C9365689</td><td class=\"sbody-td\">CECF125DFA5328B7FC7D112575CB5DB054D85AFC35CB39A1CF29CF43B20E7A0B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-NLD.exe</td><td class=\"sbody-td\">73B33C6555BE82212B86046FDD3ACB8FCC732672</td><td class=\"sbody-td\">45A1E049512F9A0A333CDB93476C1DAD7F180435573D7A60720438115A6804C9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-NOR.exe</td><td class=\"sbody-td\">0CD4078D27D5CEDB03DFE8EAA31F4BFF800B0B60</td><td class=\"sbody-td\">1E08225C9B696A833E6EF6D95F6D4E3CA6FC43FA71A0AABBF739E201C0B96D1C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-NOR.exe</td><td class=\"sbody-td\">8F826CE0757BA2794FF626AA025FCCC3A4B53498</td><td class=\"sbody-td\">AA047E1358A2861082A8C6BE6A0005EA0B4B70C1B82AB5ED2BA452374A8EBBBE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-NOR.exe</td><td class=\"sbody-td\">AB2047723AAF394FA98D95DC65EC890FDB4402A1</td><td class=\"sbody-td\">81002D26691E185A079CBCEE8E659DA818BF5BCB2F483B9AA64EBFB3ABF1960E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PLK.exe</td><td class=\"sbody-td\">1F36266418C1DE50B29C57E87787EDE85667E962</td><td class=\"sbody-td\">678C58E1061FDC413667BA69EF4756B51661FDE8F7DED8C83881CC5C2DB56673</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PLK.exe</td><td class=\"sbody-td\">3B4DD9F76EB469F4BFF06D68A61B3A3321CE5377</td><td class=\"sbody-td\">3E426917CA0A5011E8678881D7D1714AC045A05E67E9A3CD3A4D41C5E154A66B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PLK.exe</td><td class=\"sbody-td\">CA1129954AC49BB2F740C98AEE1896CD2F15280B</td><td class=\"sbody-td\">CA6974583EED098A4483B8AB4B0F2DC7078992DB872BF6A3150B083F683259FD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PTB.exe</td><td class=\"sbody-td\">270FEC2DAEC90A1A6709612CE2010EB07295516B</td><td class=\"sbody-td\">A731E7D7486BED45E0A691A78AB2068D4D2A190414444CBDBA888F8FCA28BC76</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PTB.exe</td><td class=\"sbody-td\">8D59A66420538D6F4DB19666181B4229E87EBBAB</td><td class=\"sbody-td\">E9638479D43C57EB60F1D28E9FE2E0F2AD47D16C46600B6C8243CBBF06D4EFDC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PTB.exe</td><td class=\"sbody-td\">E37D855345F5EC6A4887A3C086B280A10036514E</td><td class=\"sbody-td\">11FD2D9F0AEE894184837DEE044599BA1E0E04EB7108C0CDA2168C0711537E24</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PTG.exe</td><td class=\"sbody-td\">36B0BDA1345AADA2A597C07B1450434E8DA6E3DF</td><td class=\"sbody-td\">05C869F65619532D174D19CF0BAFEB16266776E5BC0B67C663C6DB119AD92200</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PTG.exe</td><td class=\"sbody-td\">61E6A3F2597150DF4DD67448DCAB20C352F6CDAD</td><td class=\"sbody-td\">878F450576B73AFAB98427573FCC8BE97FCD9F119E705B27C39F22BDF947AB8D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-PTG.exe</td><td class=\"sbody-td\">B0D6CCAF4F03BE9B512FCEB8E0A1E071DCC798ED</td><td class=\"sbody-td\">9C703050480D0B38B683AAC2C3E85CAA26F17D5E699F1E4BCDEB8F1A99E6C288</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-RUS.exe</td><td class=\"sbody-td\">94C2A7E852120C96CE2D0E8A49EEED7B8993256A</td><td class=\"sbody-td\">7199F040174936D68D9E9C9589F5BDE663CE8755602DD39418F80B1991599295</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-RUS.exe</td><td class=\"sbody-td\">A901AF03D6E257191380B7EE69B7EAF273464D31</td><td class=\"sbody-td\">3A941F643A92E2AD2FD5B2163DAD49EF3A0973CC86A59EC8565787CD4A358D31</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-RUS.exe</td><td class=\"sbody-td\">DE0454C56EC0C611E8BD9C1490B728B26D02E81A</td><td class=\"sbody-td\">E954EA851C7FD2A98D6D1DF4D18A9517708D0084C285556DD959A5E5BA9C1DF8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-SVE.exe</td><td class=\"sbody-td\">7C154A107424BC5EB55C7C6B2CA72A22A80F3DDB</td><td class=\"sbody-td\">6B42CAC3A9E73825959737488AD8833D146AA2FE591C113260387ED18A355725</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-SVE.exe</td><td class=\"sbody-td\">E2476132B9DDCD0237B2D35A95DC13BC5BE04830</td><td class=\"sbody-td\">51ECA550D64DDD97F116C6EB5F2145374CE8BAB496CA74D9B44EADC65A34728B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-SVE.exe</td><td class=\"sbody-td\">E771F190F10B87DB394F67EAF3380969461DE551</td><td class=\"sbody-td\">4F74F380A0BBC6653118D634FEE392B1DE5661A4D54984983EBE290964AB0843</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-TRK.exe</td><td class=\"sbody-td\">187A2A45060744B807DA05864FBAE79B188546C5</td><td class=\"sbody-td\">98630A6C72B46A363A18BBE6B2207757A17D3240C8A6C89C103AF9DD22F56934</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-TRK.exe</td><td class=\"sbody-td\">4254C051D65028EDA8A0D55E94998A3E2528AE60</td><td class=\"sbody-td\">53000AF5647FBA82AD8399C47748770CBFC040F0182377A41C5B2AF661AB74DE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsMedia-KB3067903-x86-TRK.exe</td><td class=\"sbody-td\">471958296FDCF3AA7B47AC6D0C32643C3E5728F2</td><td class=\"sbody-td\">EBE0C3CCCB43B1FAF7C3F78A6E6523F4B155387FF0E48A43B449BA0E4D774654</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-CHS.exe</td><td class=\"sbody-td\">76841766FC3D921B0A4BCDA13838CAE2F7ECEA10</td><td class=\"sbody-td\">036ECFA1391FA8CDED4F93BADE22C4F960E935977E749A19B4793536C651037F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-CHT.exe</td><td class=\"sbody-td\">693E34584D4455E8BFFBC0FBAC205C0E74A6D7A5</td><td class=\"sbody-td\">35E27137FC5B21308E4735A4FBC185262DDB2D75E8BA7A791FA79FE65131A29F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-DEU.exe</td><td class=\"sbody-td\">9604D4ECA68B10E05BB40AFF9EFF0B57087D2355</td><td class=\"sbody-td\">25ECA42F019436F1AFFE8C98EFD7FD7C10AE1517FA146B2B90BF9F46887D47DE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-ENU.exe</td><td class=\"sbody-td\">56590D1FC4BA760994A094504863136E6F98802B</td><td class=\"sbody-td\">E36523B09289AAE09DEAB9EAC09F09EFC0CDD1752FE3C094FFB1D0EE60019AD0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-ESN.exe</td><td class=\"sbody-td\">E5C3B9E561407AE5E948F7A4CAF6092CFF89C2F6</td><td class=\"sbody-td\">F49C0F4F3216FEFAFE8EE9571E13ADB8962DDA0D0AAE5142AC83DDC16397288C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-FRA.exe</td><td class=\"sbody-td\">02BCF9C22260F2EADB1819FDD16D06D9BC3BF91F</td><td class=\"sbody-td\">1A2179D15D1348B5EF48660CB16812F4DF1A78AEBB6A138F2B7041DAD2874F72</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-ITA.exe</td><td class=\"sbody-td\">7E065BB247F8D9621693DE016BC7A2BBE1FC7C5B</td><td class=\"sbody-td\">2BCEA130F0080E33BA2378C5AF5D81DB966F1641B9EEE3C0EF666888A276BE76</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-JPN.exe</td><td class=\"sbody-td\">37F1E2AB47E172175415539E95DD58EB857D80F2</td><td class=\"sbody-td\">6C6AB056054B34CBD43F18DFC5609EA5860A6EAA33B2BD16F985DB9EB6B5BFAA</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-KOR.exe</td><td class=\"sbody-td\">5D0B0062F23CAAFA63D526ABCB243FE67DC28E42</td><td class=\"sbody-td\">A93B0BE045805EB06B6E89A2EF24AEC6605B8BD1134BD80D832062C7A1E7B2EF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-PTB.exe</td><td class=\"sbody-td\">C11B86D381AC8E4D922E8AB545B1F2A86FE7FE83</td><td class=\"sbody-td\">1DCF6A9FCF8FD8815595952461EAAB2AFFD64E667CEB9FC78EBD19D50613D638</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x64-RUS.exe</td><td class=\"sbody-td\">143377F154B527B7D07B392EC892430F7F4C0046</td><td class=\"sbody-td\">10ECF84DCE183DDCCD05809A4AAEFCD3DA8B91B0CE64BCFB40429091AE6386B8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-CHS.exe</td><td class=\"sbody-td\">251176E7FD0830AE03230C02541AB1B714503871</td><td class=\"sbody-td\">930802306271E6E4CEA66FE5C6E962E085472EC98FADCD3BAD7FD3C8F47EEB22</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-CHS.exe</td><td class=\"sbody-td\">A15C7669011735C671D0323A81898DAC38036359</td><td class=\"sbody-td\">957A08580FEF4AE2667ABB723D2D60AAE9EBF3ABDE03F42B505EF974D00A1306</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-CHT.exe</td><td class=\"sbody-td\">75E21B0EA339A37BFD2EFAC1A75DA532BF1AED17</td><td class=\"sbody-td\">F93809E57EC0DEC571B6783D644E1A6806660A34A8D80CFC7A479199CD02717C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-CHT.exe</td><td class=\"sbody-td\">81CBED4FB4A906ADA607D4F3D34DA8BBBBD019AB</td><td class=\"sbody-td\">1DB9AB79018CD52339254D511A627FA431DA5083796D9D6D24E2F471CEDA739C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-CSY.exe</td><td class=\"sbody-td\">5720C1A582B762F95DA265C750745273EE51C477</td><td class=\"sbody-td\">8730CD9301BC337E86FACCCCED0698C017C70F7753A1CB4F90D94A24D9F8B056</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-CSY.exe</td><td class=\"sbody-td\">A311DAA1D2DD1DB9B85BA50D835773A6C3A4678F</td><td class=\"sbody-td\">B60C630E0962B368EBA0BA3DB926EA90CF87662EE2A4DC6A6DA15CCE9D0A10C0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-DEU.exe</td><td class=\"sbody-td\">8A0C9AFFC76C3A6D84FE6F8D6CD4287E66C81D3B</td><td class=\"sbody-td\">B26979C50071618BCBBED1DAB80A3943A83B6B8AC74E1E29410A793A8CEB470A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-DEU.exe</td><td class=\"sbody-td\">BE25A4F856CCB2C670ACD36288E27DFA44896744</td><td class=\"sbody-td\">6ED9CC0B45FCD6654A8210D76FE513A69DC8266E4C2E7BE2B7EA92113E4D98A1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-ENU.exe</td><td class=\"sbody-td\">4292CDB5D0FA8EC2827AE19D5BBB6170D125D400</td><td class=\"sbody-td\">88B7DF93770C1B202A05C9FC426117533EA1746B8640BF5E44A602FAEB1B7E02</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-ESN.exe</td><td class=\"sbody-td\">1D63569A6EEE2369777B1B942E77D2D4032DA0E0</td><td class=\"sbody-td\">E4D3DB6064640BFFF36B48F2A516AD28B59DDDF89AD60647C0610376D8082FC7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-ESN.exe</td><td class=\"sbody-td\">7205D0B5A62D14B0FE6B8A979F0BAE66319E493C</td><td class=\"sbody-td\">A3163350F77E999A409701A0635E171D5BE99532E7EA27683DE76E7F57CB9A67</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-FRA.exe</td><td class=\"sbody-td\">7BB4382B17D4229F9428FD0341CD07AA48087BEB</td><td class=\"sbody-td\">914C364A25D3985BC4AB3AE9E866BC3154E3180C62D9F35B3744C02CFF1EAD05</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-FRA.exe</td><td class=\"sbody-td\">C934214248589DA5915789B877E377B119914978</td><td class=\"sbody-td\">9A6276A54A329EEE2ED2C82490A3040697635331B8A687B3250C810E3E526BB5</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-HUN.exe</td><td class=\"sbody-td\">4794A8A34C9111FD1335F24BE12DA07B3DB12440</td><td class=\"sbody-td\">857D25A86512695AB5391601FC085E21B18E12D2256A1FE0699FCE4DAD5B4A39</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-HUN.exe</td><td class=\"sbody-td\">F634D159FC588FD4FBCE25A5C3CAD5ECD0658451</td><td class=\"sbody-td\">68CE7242AF7B67EA6F72D87E71751AEFC73A93BAC52B6E1B3396C4F2B9A8887C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-ITA.exe</td><td class=\"sbody-td\">15C883BC625C6F09D81AD3951D099CC5EDD95F8F</td><td class=\"sbody-td\">9D9E8EB2AA60ECD0681A34C5841B25F53DD86E80E82350523404AD85EDD3ADC3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-ITA.exe</td><td class=\"sbody-td\">EF519C4EBA4A68C4B3D3D27BC3919A5DEDA56C8C</td><td class=\"sbody-td\">A6CF0883C4251D7512B14BDCF06F7E44D564F838A6C9B9853EC38D45455DE05D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-JPN.exe</td><td class=\"sbody-td\">CBE30E56A655401BFB61567E1F17A5D0B0669182</td><td class=\"sbody-td\">EF9A1FE7D4E62340AE336B02190CE5DF3B4C9F4DED774AB16FBC2D3AFD0D9A17</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-JPN.exe</td><td class=\"sbody-td\">DBE3202D89A5C29154AB053407BB55B42707A62D</td><td class=\"sbody-td\">BB5D36E850176DA95544CB2505BCBA3D817A5D8E8BF8FA5D1500891855E61BA6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-KOR.exe</td><td class=\"sbody-td\">0917F21D3C66F3A75C50A4914C8E2807D76F1C43</td><td class=\"sbody-td\">46F9A722C4C5109D25BE53DAD3EC9AA86EECDCE344C644968165EEC804DC3AFC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-KOR.exe</td><td class=\"sbody-td\">1DBB723302CDF5F76B7C7FFE95F8E13A80EC4011</td><td class=\"sbody-td\">08A1493BCB47561C141C8E7EA07265FE77F977F7B67740F9A45310AD0E609146</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-NLD.exe</td><td class=\"sbody-td\">0AE892A40E2991B498A72FCC234F0E39F327FFAF</td><td class=\"sbody-td\">8B8FBF7CC47B60D7D836CEA67EA48F4D0AA3FCE17F1691508D34E272167CA9E3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-NLD.exe</td><td class=\"sbody-td\">CD50BCA17BB757CEC1E0DFAC283F25F9CEA102FA</td><td class=\"sbody-td\">03909B33A0CC4954BEEF3279DA03A97F025032960473DB14CD87B93A9E1738BB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-PLK.exe</td><td class=\"sbody-td\">3AEB74AF320A23B39F17FF1B3BF837143C950638</td><td class=\"sbody-td\">100636F0495545204AAB0D8B96D628A4995EC3B26F2D442B4E2278B194261B6F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-PTB.exe</td><td class=\"sbody-td\">298B2734711AAACC538D5A1CF4895D3E8E982548</td><td class=\"sbody-td\">A59CD09D950FF2626CDE476F0933644AB90E01F1054F80B84A87F59AE410128C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-PTG.exe</td><td class=\"sbody-td\">9077C3C17CB714653A18B4E46FA3BDDBF961B5BE</td><td class=\"sbody-td\">D5F22F7E64CED4E780C6F046A9BBFE8B8CB09910E26E1FE1D3409557D6456B7F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-RUS.exe</td><td class=\"sbody-td\">645E7499D9A8ABEAD20A02B7CD32739C05DB7CBC</td><td class=\"sbody-td\">5945822F77D4694F5260F8DE38E7620F078D16BFE2005E2187F6DE7D4598684C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-SVE.exe</td><td class=\"sbody-td\">7BC0FDA51A48AA30D92086579D787D9D4B623700</td><td class=\"sbody-td\">F06B1516AEF08DEF59714088F4A3E84817BB4301BD0E1A54D096373DB31C1167</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-SVE.exe</td><td class=\"sbody-td\">858BFFEB914F4EF86EF35D495B1194A6AB96EDA4</td><td class=\"sbody-td\">26C8CE8B78C33BE393F46E2AAEFA0B33D0033D81D9D429BF4088EB6D491AF28A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3067903-x86-TRK.exe</td><td class=\"sbody-td\">3F55CB93F560E658EFACCB6F9D2EFBBCC8D2A3F6</td><td class=\"sbody-td\">EC9C332271937AE295F91F2A4BF4CFC55EC82F4CAC6148AD55E544078C2B1BAC</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help for installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-26\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-27\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-28\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-29\" target=\"_self\">International Support</a></div><br/></span></div></div></div></div></body></html>", "edition": 2, "cvss3": {}, "published": "2015-07-14T00:00:00", "type": "mskb", "title": "MS15-069: Vulnerabilities in Windows could allow remote code execution: July 14, 2015", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-2369", "CVE-2015-2368"], "modified": "2017-02-03T22:32:16", "id": "KB3072631", "href": "https://support.microsoft.com/en-us/help/3072631/", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:44:51", "description": "<html><body><p>Resolves vulnerabilities in Windows that could allow elevation of privilege if they are used together with another vulnerability that allows arbitrary code to be run through Internet Explorer.</p><h2>Summary</h2><div class=\"kb-summary-section section\">This security update resolves vulnerabilities in Windows. These vulnerabilities could allow elevation of privilege if they are used together with another vulnerability that allows arbitrary code to be run through Internet Explorer. If the other vulnerability is exploited, an attacker could then exploit the vulnerabilities that are addressed in this bulletin to cause arbitrary code to run at a medium integrity level. To learn more about the vulnerability, see <a href=\"https://technet.microsoft.com/library/security/ms15-075\" id=\"kb-link-2\" target=\"_self\">Microsoft Security Bulletin MS15-075</a>. </div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><span class=\"text-base\">Important </span><ul class=\"sbody-free_list\"><li>All future security and nonsecurity updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-3\" target=\"_self\">2919355</a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-4\" target=\"_self\">2919355</a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive future updates. </li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href=\"https://technet.microsoft.com/en-us/library/hh825699\" id=\"kb-link-5\" target=\"_self\">Add language packs to Windows</a>.<br/></li></ul></div><h2>How to obtain and install the update</h2><div class=\"kb-resolution-section section\"><a class=\"bookmark\" id=\"obtaintheupdate\"></a><h3 class=\"sbody-h3\">Method 1: Windows Update</h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see<br/><a href=\"https://www.microsoft.com/security/pc-security/updates.aspx\" id=\"kb-link-7\" target=\"_self\">Get security updates automatically</a>.<br/><br/><span class=\"text-base\">Note</span> For Windows RT and Windows RT 8.1, this update is available through Windows Update only.</div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Method 2: Microsoft Download Center</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.<br/><br/>Click the download link in <a href=\"https://technet.microsoft.com/library/security/ms15-075\" id=\"kb-link-8\" target=\"_self\">Microsoft Security Bulletin MS15-075</a> that corresponds to the version of Windows that you are running.<br/></div><br/></span></div></div></div></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Windows Server 2003 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span>s</td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3072633-x86-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3072633-x64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3072633-ia64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-9\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Update Log File</span></td><td class=\"sbody-td\">KB3072633.log</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">Use the <strong class=\"uiterm\">Add or Remove Programs</strong> item in Control Panel or the Spuninst.exe utility in the %Windir%\\$NTUninstallKB3072633$\\Spuninst folder</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Updates\\Windows Server 2003\\SP3\\KB3072633\\Filelist</td></tr></table></div><h4 class=\"sbody-h4\">Windows Vista (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3072633-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3072633-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-10\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support the removal of updates. To uninstall an update that was installed by WUSA, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Replacement information </span></td><td class=\"sbody-td\">This security update replaces the following hotfix:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2545479\" id=\"kb-link-11\">2545479 </a> A memory leak occurs, and client requests may take a long time, when you run an application that is based on COM+ and that is registered as single-threaded</div></td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3072633-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3072633-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3072633-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-12\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support the removal of updates. To uninstall an update that was installed by WUSA, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Replacement information </span></td><td class=\"sbody-td\">This security update replaces the following hotfix:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2545479\" id=\"kb-link-13\">2545479 </a> A memory leak occurs, and client requests may take a long time, when you run an application that is based on COM+ and that is registered as single-threaded</div></td></tr></table></div><h4 class=\"sbody-h4\">Windows 7 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3072633-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3072633-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-14\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that was installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch, or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Replacement information </span></td><td class=\"sbody-td\">This security update replaces the following hotfix:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2545479\" id=\"kb-link-15\">2545479 </a> A memory leak occurs, and client requests may take a long time, when you run an application that is based on COM+ and that is registered as single-threaded</div></td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 R2 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3072633-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3072633-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-16\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that was installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch, or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Replacement information </span></td><td class=\"sbody-td\">This security update replaces the following hotfix:<br/><div class=\"indent\"><a href=\"https://support.microsoft.com/en-us/help/2545479\" id=\"kb-link-17\">2545479 </a> A memory leak occurs, and client requests may take a long time, when you run an application that is based on COM+ and that is registered as single-threaded</div></td></tr></table></div><h4 class=\"sbody-h4\">Windows 8 and Windows 8.1 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8:<br/><span class=\"text-base\">Windows8-RT-KB3072633-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8:<br/><span class=\"text-base\">Windows8-RT-KB3072633-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3072633-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3072633-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-18\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that was installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch, or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2012 and Windows Server 2012 R2 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB3072633-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB3072633-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-19\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, you receive a message that advises you to restart.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that was installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch, or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows RT and Windows RT 8.1 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Deployment</span></td><td class=\"sbody-td\">These updates are available through <a href=\"http://go.microsoft.com/fwlink/?linkid=21130\" id=\"kb-link-20\" target=\"_self\">Windows Update</a> only.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart Requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal Information</span></td><td class=\"sbody-td\">Click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File Information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr></table></div><a class=\"bookmark\" id=\"fileinfo\"></a></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3072633-ia64.msu</td><td class=\"sbody-td\">F623C6DF56E8E3206E963D5B13A8BA48CF030E59</td><td class=\"sbody-td\">D3EE5B9CA838F6FE3C1D8225D4E8149F56A2DB3B071ADA2B528B49AA727B1052</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3072633-x64.msu</td><td class=\"sbody-td\">1BBEC5F5DC46C284E56A761279CA42E6F0D47B6D</td><td class=\"sbody-td\">81DDD6679208F4B1DBDFBAAD745010E22BB91F3CD4A6DE2AB1991691A75AC644</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3072633-x86.msu</td><td class=\"sbody-td\">E801860FADD98003C0D7EFB17168549BC26CA0B8</td><td class=\"sbody-td\">5B363588A290ADC166E0FA5BF81CF47A497F144AFA25DADF7996197D673B6CE6</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3072633-ia64.msu</td><td class=\"sbody-td\">AD5E8FD444F6E590A0ED6D2AE8CE957443031358</td><td class=\"sbody-td\">3D8D7BA3F2555AF86612E4C2BEAAAE32CDE388B6A3113D749DA427E7FBB87050</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3072633-ia64.msu</td><td class=\"sbody-td\">E2DFAD6567A8318B9F2865EAAC947FBA8DC55C31</td><td class=\"sbody-td\">640CA23158A5ADEFA959A77CC86F794627E258DAC49450008387A1B3FF6A2EE4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3072633-x64.msu</td><td class=\"sbody-td\">A4B7CF726C5471B38D254D1B933905D4B8364F46</td><td class=\"sbody-td\">DB229CA8EFFBE5EB9373164ED0F407F8A6E278769906FDD41B82374ACC0B7764</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3072633-x64.msu</td><td class=\"sbody-td\">A7B0D999D53B9C30D8EA65FC5200FCEC42CD30F4</td><td class=\"sbody-td\">4B011D355DC71763E9BFD6C970F7ACEA0BA3679D6E7E621516E49D65038A556F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3072633-x86.msu</td><td class=\"sbody-td\">35EC26B703208A34AEBB291E7C283360AFEF8575</td><td class=\"sbody-td\">24C090EF8BA60AFEC4BFBEC40C6C716BE847631262E5477EE6AB19FF23582BD4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3072633-x86.msu</td><td class=\"sbody-td\">591BB6BE5680B31FF48846C447F7EC437CC160F2</td><td class=\"sbody-td\">536BB963E3350C358E2BBCEE8C700BBD6750F4ACBF8A364A751AD05D0691E3C4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3072633-arm.msu</td><td class=\"sbody-td\">F71DFEE152DBE8D1F441C34D7FB3655EAC445101</td><td class=\"sbody-td\">012838C3BFF086B924BF9C709F9E0B708F5B259426C96CFA2FBD5696C6CF5106</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3072633-x64.msu</td><td class=\"sbody-td\">2E3C1314DA5EAA9D31F06ABEF928E5E97EA33A73</td><td class=\"sbody-td\">5AE5D76559791031D503B43F03BA8F9ED29DBF9FB86E6C87EC0BB284F1C24D70</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3072633-x86.msu</td><td class=\"sbody-td\">8C90E7612825BF5C14C4CC2B56D25533076B6F23</td><td class=\"sbody-td\">4284A7BC223B7B43ACCA9336B5CE7F28A1D7FB78D933B816FFB49B5E20B02EDF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3072633-arm.msu</td><td class=\"sbody-td\">4363B16D3974A5DC4B45D07A64DFCFEF402F8BCA</td><td class=\"sbody-td\">861D83F053C4E49517BB5782F1E05D706B0F05BDF7EF25EDFFC35E6FB8DE7179</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3072633-x64.msu</td><td class=\"sbody-td\">E20E1656EE7D45D4F6C6E7261565AEB76C115E48</td><td class=\"sbody-td\">F41E853281EDA2CAE58C6D1F0F7B14E1C20519E4E2E893AE62866AFE25FBE99E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3072633-x86.msu</td><td class=\"sbody-td\">6B35D8614663A9098FA4D1AA8BE85DFED22A111E</td><td class=\"sbody-td\">7C035A07BED3CBA924AD9BC56BB47569FBB47C25A8A2836C0DDCC36B3F6CD141</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-ia64-DEU.exe</td><td class=\"sbody-td\">95EC879B239C73D8A49425229CE4E1FF2DB7452D</td><td class=\"sbody-td\">0B031321571220E0357F4E5C9C0812AA7A6380C7155DB554D7653726DAF6C696</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-ia64-ENU.exe</td><td class=\"sbody-td\">184FF99230614DB939C6118D3DA64509FA9FD831</td><td class=\"sbody-td\">BFE8AB44A0A44A333D6C5F107F0DA60099C34C9E74832B3B165C4E68ADF4D57C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-ia64-FRA.exe</td><td class=\"sbody-td\">27ABA7C36E4AF2083EB6244C39606A869B69806C</td><td class=\"sbody-td\">8425E1DEAF8BCC6BA9B4360BDA55CDC79361B6650F1C526D3F94C5876889082C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-ia64-JPN.exe</td><td class=\"sbody-td\">F77F3D9E4F0C458B487A3F6537CCF3A51E71DF44</td><td class=\"sbody-td\">F241759C0F0BC14B6608FF5A86E840F0091A9FEF58D4E70D01366850C2FB0C26</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-CHS.exe</td><td class=\"sbody-td\">91F402F0A847FA19CE22A64953B5CD4B36B62A8F</td><td class=\"sbody-td\">2F8697E2E1DC0DC527F591AE6D8993565F92AC76C21CEA9DEC3E2F06A5386D0A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-CHT.exe</td><td class=\"sbody-td\">988CD2D6A8DE8863AD812D9EC0E281A35A502F14</td><td class=\"sbody-td\">EBEB0D4E661179F585A9167BCFEF531033BF4B61A96BC338A31E346CF29362F1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-DEU.exe</td><td class=\"sbody-td\">C4569EDD04CDE1EDEE81291DA04343615F924487</td><td class=\"sbody-td\">846E58D8237FE0347DD1EC50863BBD8AF96FF9F7878DD40F8CBB3387F1AEAF7A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-ENU.exe</td><td class=\"sbody-td\">E3BEE4EA9CAB584B77067F26E4AEED5428436327</td><td class=\"sbody-td\">1E0D4065F34BEBD5BDE679779EC7472CD7E0A285BC7209A50AAE744D4849CBDF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-ESN.exe</td><td class=\"sbody-td\">137FC970BAFB5EF9063608BDB5457050C7153557</td><td class=\"sbody-td\">A55E633DE1AD38F05967C41A23ADF36355218AA6D513FE493395AB36BF4C5129</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-FRA.exe</td><td class=\"sbody-td\">9CB5EA6161544FC8A47B54867C8955D9540DD176</td><td class=\"sbody-td\">5D48E60F8E4C0066D2A9EFF61A622E856A0AD265D7FD427EC32AC81E8BBAE43A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-ITA.exe</td><td class=\"sbody-td\">BD8F0FB49DFB51AEAE07D43F5702DA7760D3C66A</td><td class=\"sbody-td\">8EC6776A8B8131561DE0AD4AA59B46591A82F3DA38B094EA5F74B4E78C2C4F1D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-JPN.exe</td><td class=\"sbody-td\">6D7AE2DA3F2B76DE36B097BB29402F2D4B8F00A5</td><td class=\"sbody-td\">90490589EE4A1B8967B8D662FEC1B6214C9CE7BD4CB012831E07B0AC10100137</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-KOR.exe</td><td class=\"sbody-td\">98F6F36C43BFD91FBBA0CFD8E52B7A76C79916C5</td><td class=\"sbody-td\">3BEC1D385C4DC2E4E6C35C99AC703FB8A9BFB5C83A7D6647FCAB55038D0F4194</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-PTB.exe</td><td class=\"sbody-td\">9F13C71EDAF9A51704D1A379BD3AC35022BE33D2</td><td class=\"sbody-td\">95D28BCD4C05B1F013D608B2D4765F99C6BAD5E4DAD24580B58F9AD4F5B8929B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x64-RUS.exe</td><td class=\"sbody-td\">A1083EA71AF08801DF36BFA672FE7200DA3B32DA</td><td class=\"sbody-td\">09EB721B6590C08F8C3FFABA653A2FC8179CEA4DBEF4D6993C0BFEFD72D9FCAB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-CHS.exe</td><td class=\"sbody-td\">7A779C5142B436343AC285CF018EC8E3F6504A2D</td><td class=\"sbody-td\">6C71797D785EB96E90B50B68A198EE2A775BCC049DC7F79629F0BCA24E940173</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-CHT.exe</td><td class=\"sbody-td\">364DCB855FFCAF2520D7177E6A8C7A79496855E8</td><td class=\"sbody-td\">140CE6D9E7B4684009C4DA4E738D8BE4F5228803FA437FF2E5F5E966F21CF29D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-CSY.exe</td><td class=\"sbody-td\">FA5CEF79D19934B04DB2AA726562699C7EBC203F</td><td class=\"sbody-td\">3B24FA3AB2354F9554C9D201615F7DFCEEB719DC187B70A20E2D4B7A717DF36D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-DEU.exe</td><td class=\"sbody-td\">A0375D797D79E2727C1A9E3EBB38EC158C334626</td><td class=\"sbody-td\">0E5C6B2DA0305EFBAFEF12C4AAB1BFBBAC0C897CDFFBAC5CAFB6C69F96E4DAAB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-ENU.exe</td><td class=\"sbody-td\">D85FF98CC1D9CC78A4FDDE77821BB254E157E257</td><td class=\"sbody-td\">3CFC66CACD42B4A60941A62D44972F20DEAD739170FEB2CC43B761EC5F240283</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-ESN.exe</td><td class=\"sbody-td\">B6D7B305C287223CE0D5179B8D8C4C143722F329</td><td class=\"sbody-td\">171907D37CE474EACB1B96C354ACEBC5E3E0312472A691F6F5E8CE403F32BA88</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-FRA.exe</td><td class=\"sbody-td\">092301444A0587132C3866C8A06CACE33286A06C</td><td class=\"sbody-td\">D8B0A53549F5078365B57ADADE1E7B1589C8E192FE500FC0E1F623F35C401CEF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-HUN.exe</td><td class=\"sbody-td\">CF555E9701560685C351796AF651E8C217043C6C</td><td class=\"sbody-td\">A6E12B304C92D13355AE0C77CF14CEC596098E8363B94044FC1F487EBDAA7C8A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-ITA.exe</td><td class=\"sbody-td\">198074BE19B7C2911808CA845F8954F3EB59FDED</td><td class=\"sbody-td\">00AE47ABF349B848E145C19E2911DF3A9ADCAA4BB1572E547A38D551A2BDE3B8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-JPN.exe</td><td class=\"sbody-td\">457536E41F8801C5B1F8F6D5DC446FC4C142FD6F</td><td class=\"sbody-td\">91F1330CF081AB3E88EA720B2622CE0001534922E46BDCCBD731175E250BB6DE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-KOR.exe</td><td class=\"sbody-td\">8C1E845FDE776EF3727497C4B302240DA881D6B8</td><td class=\"sbody-td\">955FD329ACFBD1DE5F0F496663D11C2518C5E2A0425FF163792A20458023CD3E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-NLD.exe</td><td class=\"sbody-td\">B1F3392AA6BC0AD2F2D1F24DCEB1F8B7102F8550</td><td class=\"sbody-td\">8EF35C00625076A6E71D5297D1A90B71A1192CD42B293BFBB2EFDF0C059B80A7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-PLK.exe</td><td class=\"sbody-td\">032B08525602C2CE72C4DCC082870CC2F256B0CD</td><td class=\"sbody-td\">B34B1A0B46CEA3874132589AB2BA49929E9C3040D2C2DEFDF3AA4BBAE1647CCE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-PTB.exe</td><td class=\"sbody-td\">05A29361847AF39E64870649F8C8C0B04383F09A</td><td class=\"sbody-td\">3DBAC090E8BD54E17FD3F7EF558A48D5E8810D9A58DB325BBBC11BD3C8743946</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-PTG.exe</td><td class=\"sbody-td\">B7588E54F430BBDCCA4A7ED8F629D1E580B912B4</td><td class=\"sbody-td\">4B433D82B8B98242FAB5AFB022B099874898790A86189C23CD289C8A6BCD0225</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-RUS.exe</td><td class=\"sbody-td\">3C49BBDD251E87A2E37C18C3297183739FE80749</td><td class=\"sbody-td\">AFAB9D51354A45EEAA9C798B3C7F268FBDC7FAE7F0E306DBFABD35671BD04730</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-SVE.exe</td><td class=\"sbody-td\">8A463F1086B719F29AD029A40ACB221B418F697D</td><td class=\"sbody-td\">BDADE10135B1E4D3A4828373697279E5AD00E242C21F5A804888F9E1884EDEFB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3072633-x86-TRK.exe</td><td class=\"sbody-td\">86B8236753F9381BF6A7DC1B9924FF2E698BA77E</td><td class=\"sbody-td\">CAEA3539BB1E5C58A9AA2933C6F372588B12DA67D2780F4CDDE1A5485CABA569</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.<br/><br/><br/><h3 class=\"sbody-h3\">Windows Server 2003 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific milestone (SP<strong class=\"sbody-strong\">n</strong>) and service branch (QFE, GDR) are noted in the \"SP requirement\" and \"Service branch\" columns.</li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.</li><li>In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KB<strong class=\"sbody-strong\">number</strong>.cat) that is signed with a Microsoft digital signature.</li></ul><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">SP requirement</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">5.2.3790.5663</td><td class=\"sbody-td\">2,630,144</td><td class=\"sbody-td\">18-Jun-2015</td><td class=\"sbody-td\">07:05</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">SP2QFE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Wole32.dll</td><td class=\"sbody-td\">5.2.3790.5663</td><td class=\"sbody-td\">1,270,784</td><td class=\"sbody-td\">18-Jun-2015</td><td class=\"sbody-td\">07:05</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">SP2QFE\\WOW</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">5.2.3790.5663</td><td class=\"sbody-td\">1,270,784</td><td class=\"sbody-td\">18-Jun-2015</td><td class=\"sbody-td\">06:58</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">SP requirement</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">5.2.3790.5663</td><td class=\"sbody-td\">4,105,216</td><td class=\"sbody-td\">18-Jun-2015</td><td class=\"sbody-td\">07:06</td><td class=\"sbody-td\">IA-64</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">SP2QFE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Wole32.dll</td><td class=\"sbody-td\">5.2.3790.5663</td><td class=\"sbody-td\">1,270,784</td><td class=\"sbody-td\">18-Jun-2015</td><td class=\"sbody-td\">07:06</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">SP2QFE\\WOW</td></tr></table></div><h3 class=\"sbody-h3\">Windows Vista and Windows Server 2008 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.0.600<span class=\"text-base\">2</span>.<span class=\"text-base\">18</span><strong class=\"sbody-strong\">xxx</strong></td><td class=\"sbody-td\">Windows Vista SP2 and Windows Server 2008 SP2</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.0.600<span class=\"text-base\">2</span>.<span class=\"text-base\">23</span><strong class=\"sbody-strong\">xxx</strong></td><td class=\"sbody-td\">Windows Vista SP2 and Windows Server 2008 SP2</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows Vista and Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.19435</td><td class=\"sbody-td\">1,316,864</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:04</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.19435_NONE_ADE8A173EF8B8DE0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.23743</td><td class=\"sbody-td\">1,316,864</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.23743_NONE_AE65718B08B3113B</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows Vista and Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.19435</td><td class=\"sbody-td\">1,916,416</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:41</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">AMD64_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.19435_NONE_0A073CF7A7E8FF16</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.23743</td><td class=\"sbody-td\">1,916,416</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">15:23</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">AMD64_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.23743_NONE_0A840D0EC1108271</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.19435</td><td class=\"sbody-td\">1,316,864</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:04</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.19435_NONE_ADE8A173EF8B8DE0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.23743</td><td class=\"sbody-td\">1,316,864</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.23743_NONE_AE65718B08B3113B</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.19435</td><td class=\"sbody-td\">4,183,040</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:23</td><td class=\"sbody-td\">IA-64</td><td class=\"sbody-td\">IA64_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.19435_NONE_ADEA4569EF8996DC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.23743</td><td class=\"sbody-td\">4,183,040</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">15:01</td><td class=\"sbody-td\">IA-64</td><td class=\"sbody-td\">IA64_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.23743_NONE_AE67158108B11A37</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.19435</td><td class=\"sbody-td\">1,316,864</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:04</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.19435_NONE_ADE8A173EF8B8DE0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.0.6002.23743</td><td class=\"sbody-td\">1,316,864</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.0.6002.23743_NONE_AE65718B08B3113B</td></tr></table></div><h3 class=\"sbody-h3\">Windows 7 and Windows Server 2008 R2 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM, SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table: <br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.1.760<span class=\"text-base\">1</span>.<span class=\"text-base\">18</span>xxx</td><td class=\"sbody-td\">Windows 7 and Windows Server 2008 R2</td><td class=\"sbody-td\">SP1</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.1.760<span class=\"text-base\">1</span>.<span class=\"text-base\">22</span>xxx</td><td class=\"sbody-td\">Windows 7 and Windows Server 2008 R2</td><td class=\"sbody-td\">SP1</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 7</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.18915</td><td class=\"sbody-td\">1,414,656</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">17:48</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.23118</td><td class=\"sbody-td\">1,414,656</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">17:48</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 7 and Windows Server 2008 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.18915</td><td class=\"sbody-td\">2,087,424</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">18:07</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">AMD64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.23118</td><td class=\"sbody-td\">2,086,912</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">18:14</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">AMD64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.18915</td><td class=\"sbody-td\">1,414,656</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">17:48</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.23118</td><td class=\"sbody-td\">1,414,656</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">17:48</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2008 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.18915</td><td class=\"sbody-td\">4,938,240</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">17:16</td><td class=\"sbody-td\">IA-64</td><td class=\"sbody-td\">IA64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.23118</td><td class=\"sbody-td\">4,938,752</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">17:20</td><td class=\"sbody-td\">IA-64</td><td class=\"sbody-td\">IA64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.18915</td><td class=\"sbody-td\">1,414,656</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">17:48</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.1.7601.23118</td><td class=\"sbody-td\">1,414,656</td><td class=\"sbody-td\">04-Jul-2015</td><td class=\"sbody-td\">17:48</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86</td></tr></table></div><h3 class=\"sbody-h3\">Windows 8 and Windows Server 2012 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM,SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.2.920 <span class=\"text-base\">0.16</span> xxx</td><td class=\"sbody-td\">Windows 8 and Windows Server 2012</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.2.920 <span class=\"text-base\">0.20</span> xxx</td><td class=\"sbody-td\">Windows 8 and Windows Server 2012</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 8</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.2.9200.17414</td><td class=\"sbody-td\">1,150,264</td><td class=\"sbody-td\">17-Jun-2015</td><td class=\"sbody-td\">14:13</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.2.9200.17414_NONE_A9144DCEC37F7876</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.2.9200.21524</td><td class=\"sbody-td\">1,150,776</td><td class=\"sbody-td\">17-Jun-2015</td><td class=\"sbody-td\">13:41</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.2.9200.21524_NONE_A9931AADDCA53431</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 8 and Windows Server 2012</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.2.9200.17414</td><td class=\"sbody-td\">1,567,560</td><td class=\"sbody-td\">17-Jun-2015</td><td class=\"sbody-td\">13:44</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">AMD64_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.2.9200.17414_NONE_0532E9527BDCE9AC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.2.9200.21524</td><td class=\"sbody-td\">1,567,560</td><td class=\"sbody-td\">17-Jun-2015</td><td class=\"sbody-td\">16:14</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">AMD64_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.2.9200.21524_NONE_05B1B6319502A567</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.2.9200.17414</td><td class=\"sbody-td\">1,150,264</td><td class=\"sbody-td\">17-Jun-2015</td><td class=\"sbody-td\">14:13</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.2.9200.17414_NONE_A9144DCEC37F7876</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.2.9200.21524</td><td class=\"sbody-td\">1,150,776</td><td class=\"sbody-td\">17-Jun-2015</td><td class=\"sbody-td\">13:41</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.2.9200.21524_NONE_A9931AADDCA53431</td></tr></table></div><h3 class=\"sbody-h3\">Windows 8.1 and Windows Server 2012 R2 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM,SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.3.920 <span class=\"text-base\">0.16</span> xxx</td><td class=\"sbody-td\">Windows 8.1 and Windows Server 2012 R2</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">GDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 8.1</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.3.9600.17905</td><td class=\"sbody-td\">1,212,248</td><td class=\"sbody-td\">16-Jun-2015</td><td class=\"sbody-td\">05:36</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 8.1 and Windows Server 2012 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.3.9600.17905</td><td class=\"sbody-td\">1,661,576</td><td class=\"sbody-td\">16-Jun-2015</td><td class=\"sbody-td\">05:36</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">AMD64_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.3.9600.17905_NONE_9D337BACC606A952</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Ole32.dll</td><td class=\"sbody-td\">6.3.9600.17905</td><td class=\"sbody-td\">1,212,248</td><td class=\"sbody-td\">16-Jun-2015</td><td class=\"sbody-td\">05:36</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">X86_MICROSOFT-WINDOWS-COM-BASE-QFE-OLE32_31BF3856AD364E35_6.3.9600.17905_NONE_4114E0290DA9381C</td></tr></table></div></div><br/></div></div></div></div></div></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help for installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-21\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-22\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-23\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-24\" target=\"_self\">International Support</a></div><br/></span></div></div></div></div></body></html>", "edition": 2, "published": "2015-07-14T00:00:00", "type": "mskb", "title": "MS15-075: Vulnerabilities in OLE could allow elevation of privilege: July 14, 2015", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-2417", "CVE-2015-2416"], "modified": "2015-08-12T20:45:41", "id": "KB3072633", "href": "https://support.microsoft.com/en-us/help/3072633/", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-01T22:35:16", "description": "<html><body><p>Resolves a vulnerability in Windows that could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application.</p><h2>Summary</h2><div class=\"kb-summary-section section\">This security update resolves a vulnerability in Windows. The vulnerability could allow elevation of privilege if an attacker logs on to a target system and runs a specially crafted application. An attacker who successfully exploited this vulnerability could execute arbitrary code and take complete control of an affected system. An attacker could then install programs, could view, change, or delete data, or could create new accounts with full user rights. To learn more about the vulnerability, see\u00a0<a href=\"https://technet.microsoft.com/library/security/ms15-077\" id=\"kb-link-2\" target=\"_self\">Microsoft Security Bulletin MS15-077</a>. </div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><span class=\"text-base\">Important </span><ul class=\"sbody-free_list\"><li>All future security and nonsecurity updates for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2 require update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-3\" target=\"_self\">2919355</a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-4\" target=\"_self\">2919355</a> on your Windows RT 8.1-based, Windows 8.1-based, or Windows Server 2012 R2-based computer so that you receive future updates. </li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href=\"https://technet.microsoft.com/en-us/library/hh825699\" id=\"kb-link-5\" target=\"_self\">Add language packs to Windows</a>.<br/></li></ul></div><h2>How to obtain and install the update</h2><div class=\"kb-resolution-section section\"><a class=\"bookmark\" id=\"obtaintheupdate\"></a><h3 class=\"sbody-h3\">Method 1: Windows Update</h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see <br/><a href=\"https://www.microsoft.com/security/pc-security/updates.aspx\" id=\"kb-link-7\" target=\"_self\">Get security updates automatically</a>.<br/><br/><span class=\"text-base\">Note</span> For Windows RT and Windows RT 8.1, this update is available through Windows Update only.</div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Method 2: Microsoft Download Center</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.<br/><br/>Click the download link in <a href=\"https://technet.microsoft.com/library/security/ms15-077\" id=\"kb-link-8\" target=\"_self\">Microsoft Security Bulletin MS15-077</a> that corresponds to the version of Windows that you are running. <br/> <br/><br/></div><br/></span></div></div></div></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Windows Server 2003 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3077657-x86-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3077657-x64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3077657-ia64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-9\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Update Log File</span></td><td class=\"sbody-td\">KB3077657.log</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">Use <span class=\"text-base\">Add or Remove</span> Programs item in <span class=\"text-base\">Control Panel</span>\u00a0or the Spuninst.exe utility that is located in the %Windir%\\$NTUninstallKB3077657$\\Spuninst folder</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Updates\\Windows Server 2003\\SP3\\KB3077657\\Filelist</td></tr></table></div><h4 class=\"sbody-h4\">Windows Vista (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3077657-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Vista:<br/><span class=\"text-base\">Windows6.0-KB3077657-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-10\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support the removal of updates. To uninstall an update that was installed by WUSA, click\u00a0<span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3077657-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3077657-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3077657-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-11\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support the removal of updates. To uninstall an update that was installed by WUSA, click\u00a0<span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 7 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3077657-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 7:<br/><span class=\"text-base\">Windows6.1-KB3077657-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-12\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that was installed by WUSA, use the <span class=\"text-base\">/Uninstall</span>\u00a0setup switch, or click\u00a0<span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 R2 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3077657-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3077657-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-13\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that was installed by WUSA, use the\u00a0<span class=\"text-base\">/Uninstall</span>\u00a0setup switch, or click\u00a0<span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then under <strong class=\"uiterm\">Windows Update</strong>, click <span class=\"text-base\">View installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows 8 and Windows 8.1 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8:<br/><span class=\"text-base\">Windows8-RT-KB3077657-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8:<br/><span class=\"text-base\">Windows8-RT-KB3077657-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3077657-x86.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported x64-based editions of Windows 8.1:<br/><span class=\"text-base\">Windows8.1-KB3077657-x64.msu </span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-14\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that was installed by WUSA, use the\u00a0<span class=\"text-base\">/Uninstall</span>\u00a0setup switch, or click\u00a0<span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2012 and Windows Server 2012 R2 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB3077657-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><br/></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB3077657-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-15\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update that was installed by WUSA, use the\u00a0<span class=\"text-base\">/Uninstall</span>\u00a0setup switch, or click\u00a0<span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows RT and Windows RT 8.1 (all editions)</h4><span class=\"text-base\">Reference table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Deployment</span></td><td class=\"sbody-td\">These updates are available through <a href=\"http://go.microsoft.com/fwlink/?linkid=21130\" id=\"kb-link-16\" target=\"_self\">Windows Update</a> only.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart Requirement</span></td><td class=\"sbody-td\">You must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal Information</span></td><td class=\"sbody-td\">Click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under <strong class=\"uiterm\">See also</strong>, click <span class=\"text-base\">Installed updates</span>, and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File Information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3077657-ia64.msu</td><td class=\"sbody-td\">F729AC6E7707D1F2B4D8C5FDF22A720F34062897</td><td class=\"sbody-td\">CCCAB0BB620D3B6A89352940FB1D385F2BAB858AD73ED34716047E56E86DDE6C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3077657-x64.msu</td><td class=\"sbody-td\">6F5503D5D9911C468F1526EDC5F4A224BE857E44</td><td class=\"sbody-td\">F8CA1BC9AFDC662C9A18DDB9BF6B1A9F0C78C164A25531F41AC9363891C643CC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3077657-x86.msu</td><td class=\"sbody-td\">02E8DA847A3B5E8D0E2542F0F92B7781CE22D981</td><td class=\"sbody-td\">955A04C1AFD806EB7DEEFE9BB9F62DEADC588815084255E5DEDE2A43DA101407</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3077657-ia64.msu</td><td class=\"sbody-td\">8901281804523D7C13A6658C813A4C264D9B11DD</td><td class=\"sbody-td\">C725B84DED3132B692DD744D680F95E06D6310BDB4AEF9D509E37FD20423EFD0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3077657-x64.msu</td><td class=\"sbody-td\">86B4E4699119048C2CB3B2D0548FAB440A1F7DE1</td><td class=\"sbody-td\">80E94834C0850AD15758C48D0504B74FAF515C1D6FB045A6C5A9510DF8003180</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3077657-x86.msu</td><td class=\"sbody-td\">B81F32F04A061C0D1043AD1C55CA276A1224853A</td><td class=\"sbody-td\">5A7E708B6F28AD75196D79CBED1E26AAAE959BE2D80C3F4506F1082022E2DEC2</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3077657-arm.msu</td><td class=\"sbody-td\">CDFF36489C64AE23F53B9974D015069F94C6A787</td><td class=\"sbody-td\">CE8C699F44CDB0F8A0C610C1351B25AA682146A027976F17A2DB9DB6046710B4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3077657-x64.msu</td><td class=\"sbody-td\">05FC6BB580E2675E02D9FF61F3DC4174E56969BA</td><td class=\"sbody-td\">E147C5B79CA465370DC6429E7C2683055B2F8D00614BE07B946CA4D4F0C375E8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3077657-x86.msu</td><td class=\"sbody-td\">CF343BBFCD7204A7F511C817108DB0B684636DC5</td><td class=\"sbody-td\">76E5BB24C6EADC9794B09CAEAA442C304DB2C715C9A62F5D133E57DC5C24D55C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3077657-arm.msu</td><td class=\"sbody-td\">06A43825F344304A92FB5B702423C3ABB1024996</td><td class=\"sbody-td\">EA426FA17DFE389678CACC15501D088A3DD62DFA58F7B0AF817D297F0F5DC160</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3077657-x64.msu</td><td class=\"sbody-td\">DAA6ACC55B18887C932E5645ABE14BB7E53C4DB3</td><td class=\"sbody-td\">5E2050C8B9EEFE5B60AA3A8077CAD067AAA318756585E0376720B3370290C0A1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3077657-x86.msu</td><td class=\"sbody-td\">8973E11BE1F25B7137BE855AA7563F7052B55C82</td><td class=\"sbody-td\">3A38FDE8C9F0115F4C560CA33EF60A76412C4E7FA3816506FB4A2D1337F6616D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-ia64-DEU.exe</td><td class=\"sbody-td\">DDB96D75B9E45C6E3F6BAEDE25B4B19AE83E1DAF</td><td class=\"sbody-td\">883A2AEE3FCA3A107678567CCD7D4840AAD0F38F4BC1EDCEA9FA3D5C70BE807E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-ia64-ENU.exe</td><td class=\"sbody-td\">2431F4A16DCF69BE6859642749202F014A384F32</td><td class=\"sbody-td\">B06F5EE7D60BB23436C9DEB50CDD89F55C615C8EFBBCB21D04A953C21B4F544B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-ia64-FRA.exe</td><td class=\"sbody-td\">0D083B83521C669C74189D54E9BB6942CD11116D</td><td class=\"sbody-td\">F114D794389E8DCDDDEF9BC42139B9935F5E23A61BDD6E586E96837D59E26479</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-ia64-JPN.exe</td><td class=\"sbody-td\">B5F642304C0E8EB714FEEDA3695E5AD7373492F8</td><td class=\"sbody-td\">272235DD8E05B2FC4EF62A0A0BF73578474A4B76037FFBE869F72A10E909FD4B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-CHS.exe</td><td class=\"sbody-td\">1484E4AADBA2950E5FC3166692C0380020CA6888</td><td class=\"sbody-td\">F7C3786016C477A743AC81AE46531A769BBA2F95F850A66E55FA8BF1D2F6C1F3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-CHT.exe</td><td class=\"sbody-td\">1960D382534D1091B2E177E539910AEEEFACBC29</td><td class=\"sbody-td\">53F1006AC1F55DEF515FBB600C764FEE0D9900A451839EE8382D81F1A13A6209</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-DEU.exe</td><td class=\"sbody-td\">70F987D75C4994A85104FF62B532C9E56BE64FD0</td><td class=\"sbody-td\">3F38489AEBBDBFA079C1DC04BE664136AC2925D0FA811C660BCB36FBF7F9A812</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-ENU.exe</td><td class=\"sbody-td\">F1A43F836FF50901742FC75D2912C3AA76F35B3F</td><td class=\"sbody-td\">82927CDF87BBEA758F1894DED5B616C9992A407C72C5DE8949F809F6FB2F3116</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-ESN.exe</td><td class=\"sbody-td\">3506357E787E7492DD37E7D4F5F01A49C0C0FD6E</td><td class=\"sbody-td\">3BA3CB94364B233037602E5B0D771D769AB89F0C286506C383D2D29FF5B96572</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-FRA.exe</td><td class=\"sbody-td\">024557A307206F977666CFDA7FCFC09F464F7E3B</td><td class=\"sbody-td\">0F68CA7F3C8D00DE5D293BEAB3E1F0AD7D11B35960978129EFC8C57AE2BD800B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-ITA.exe</td><td class=\"sbody-td\">F816286F26BD654BB330064C8E9782A1317ED2F4</td><td class=\"sbody-td\">70D1F97B41AFF9E37A2A9B70D28CB6EC5A7BAF363017DD12C73A2F56A8D9E9D3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-JPN.exe</td><td class=\"sbody-td\">03FA0EFF08509D0F80AE42527AAA78BE3A64992F</td><td class=\"sbody-td\">1FF1A61573307F87D0C0A44AD31B8089B3BB6A8B9BF3636D746395578FBD8821</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-KOR.exe</td><td class=\"sbody-td\">584DB50537B2B29481C8201EC78B8385DB7A50E5</td><td class=\"sbody-td\">34C44DAEAB60769A186FCCBCA4AD9E26DC98F6538CBFC73D1213E442DA340DBD</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-PTB.exe</td><td class=\"sbody-td\">00B1EC538AE4CE7635D4B0D2C340CDB79927A25D</td><td class=\"sbody-td\">3DBAADF41CA38346D9F9EA28B5BF6092F192D906FC538285B50F6C86053BCC4D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x64-RUS.exe</td><td class=\"sbody-td\">6534363132EE84DD555AE8B52B7972CF9877E20D</td><td class=\"sbody-td\">FC722F84F56F61CDACA04E2E82337B5ADB58B08489E40D361F35F3F222F52C37</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-CHS.exe</td><td class=\"sbody-td\">4EECAD0E086E58278FB0FC23FD4FF33453FB9BCA</td><td class=\"sbody-td\">8134CE5EAEC3CE57183E2DAE685480874706949A80775E12D1EDB9E6171E7343</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-CHT.exe</td><td class=\"sbody-td\">6E7E9E8F7089476FCBD32B33937FF1807EF1E6CC</td><td class=\"sbody-td\">ED56A2E7995253F4247B13582E9AED5B3189BE94569743F5F03BB1DDFC2B0C0D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-CSY.exe</td><td class=\"sbody-td\">D1D3B9E5BBF9A1B7F8D6F921ADB73B68FBE5066B</td><td class=\"sbody-td\">F773160B151889976D3256E7BB9546DB815BE4847CB2A6B479D3EF273A5EEFCF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-DEU.exe</td><td class=\"sbody-td\">35C4C976A09A318ADF3DF960D438AFCF1AADE280</td><td class=\"sbody-td\">74FB0B633C38C1FF5C7838C510407271E75DA42BC3D0A96388F793FE607EF088</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-ENU.exe</td><td class=\"sbody-td\">BF994C50E7B8C1581D49275F27E1D4518292BA1B</td><td class=\"sbody-td\">7BE4FE96EDA1D88E4B3E39460115AF6432CEB6CFB84ECCF44B6280AE3839CEDB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-ESN.exe</td><td class=\"sbody-td\">3666A15E076DD3049053241CF56F71826884643A</td><td class=\"sbody-td\">DDF53C5471DC1A656E4687B77FB561BEC89485A25901AAE833457A3CFA771173</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-FRA.exe</td><td class=\"sbody-td\">B625CF9CE05BAF892C46738DFF13DF999D800A1B</td><td class=\"sbody-td\">9DCFF5BBB05AAFD7EAEC18F60EB51FB2A947594B78044388A84CB1E7FA1CFDB4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-HUN.exe</td><td class=\"sbody-td\">EDE3E58DD5EF288C51967E67BAFFB97A9EF778CC</td><td class=\"sbody-td\">F9DC1D7DFF9F0928B74FF7D4E2B5214281DDF324C617C0A558F60751EF8C4743</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-ITA.exe</td><td class=\"sbody-td\">A25EC65092FBE2DEB36F05F8200FF9801020BFA0</td><td class=\"sbody-td\">9482C87EDDBD8E7A3617AD6E5DA69996030F6CDE4F146104DE8E2ED45003BD6B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-JPN.exe</td><td class=\"sbody-td\">D85D7B00E260270ABBA80F999584D9F6A9255336</td><td class=\"sbody-td\">5BD862C2D32F8FCECBA8BB8CFDE5E4C28A2DF82F26D8FD791C9B67EB049E5D52</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-KOR.exe</td><td class=\"sbody-td\">6AC41451C88AA5997D6374ADFDC718C901B46F3D</td><td class=\"sbody-td\">4D4ADAFB7CDF2016F85833DBEA182CEEDE0B2306073B2D174B9078AB1FC3F2C8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-NLD.exe</td><td class=\"sbody-td\">0C06A720E4D4F75A956530483E40087C7812B2CD</td><td class=\"sbody-td\">4D8140C9173C9757C970507375886E679A5BA796596DA8EE1CC5D0494A11372C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-PLK.exe</td><td class=\"sbody-td\">01648F8A0074988931BD6B2920B7AC37FF4FF432</td><td class=\"sbody-td\">273FAF199860D038AFE505AE235C5B4FF8511F15449BD4F9E0E75903D230A853</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-PTB.exe</td><td class=\"sbody-td\">FB0001A898D7327123A80DF70BB15C145882CDD6</td><td class=\"sbody-td\">55AA2B63DF6D0018D915A20F2B757CD759412A9CC6BB1DB50EAA1D63B80AC744</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-PTG.exe</td><td class=\"sbody-td\">279393D08585BE1DFBFF8DBC8FAA0127DDE43AD7</td><td class=\"sbody-td\">2002C190C786E2F9660426F79D3AF95C178B43DCFAAFF96CC893CD4823429AE9</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-RUS.exe</td><td class=\"sbody-td\">4B5977778EFE929A2E95A7065615C24223382A84</td><td class=\"sbody-td\">8184B717E9812567A6C9C97858DA78020481469223B1E19A7561C58FB5F5B457</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-SVE.exe</td><td class=\"sbody-td\">0B9CB28940F5584D2C0121EF8290D64D08A1E385</td><td class=\"sbody-td\">5ECDE5EEA254E1F433467516968DC7C00B98F5208360BD43A8969063C46D1F3F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3077657-x86-TRK.exe</td><td class=\"sbody-td\">9D9680C4BE79B7363FBC95BAEDA97A46D10C65CB</td><td class=\"sbody-td\">C1A855AAEC92E12F91603C3A34B98C2DCF81A948C3F3C6B619861E82FEDA9A3B</td></tr></table></div></div><br/></span></div></div></div><a class=\"bookmark\" id=\"fileinfo\"></a><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.<br/><h3 class=\"sbody-h3\">Windows Server 2003 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific milestone (SP<strong class=\"sbody-strong\">n</strong>) and service branch (QFE, GDR) are noted in the \"SP requirement\" and \"Service branch\" columns.</li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.</li><li>In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KB<strong class=\"sbody-strong\">number</strong>.cat) that is signed with a Microsoft digital signature.</li></ul><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.2.2.242</td><td class=\"sbody-td\">290,816</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">14:52</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.2.2.242</td><td class=\"sbody-td\">463,360</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:11</td><td class=\"sbody-td\">x64</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.2.2.242</td><td class=\"sbody-td\">840,192</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:10</td><td class=\"sbody-td\">IA-64</td></tr></table></div><h3 class=\"sbody-h3\">Windows Vista and Windows Server 2008 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.0.600<span class=\"text-base\">2</span>.<span class=\"text-base\">18</span><strong class=\"sbody-strong\">xxx</strong></td><td class=\"sbody-td\">Windows Vista SP2 and Windows Server 2008 SP2</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.0.600<span class=\"text-base\">2</span>.<span class=\"text-base\">23</span><strong class=\"sbody-strong\">xxx</strong></td><td class=\"sbody-td\">Windows Vista SP2 and Windows Server 2008 SP2</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows Vista and Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">296,960</td><td class=\"sbody-td\">02-Jul-2015</td><td class=\"sbody-td\">15:00</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">20-Feb-2015</td><td class=\"sbody-td\">02:03</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.18051</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">15-Jun-2009</td><td class=\"sbody-td\">14:51</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.18272</td><td class=\"sbody-td\">72,704</td><td class=\"sbody-td\">16-Jun-2010</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6002.18051</td><td class=\"sbody-td\">23,552</td><td class=\"sbody-td\">15-Jun-2009</td><td class=\"sbody-td\">14:52</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">296,960</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">14:17</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">72,704</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">23,552</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:31</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows Vista and Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">372,224</td><td class=\"sbody-td\">02-Jul-2015</td><td class=\"sbody-td\">15:16</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">48,128</td><td class=\"sbody-td\">20-Feb-2015</td><td class=\"sbody-td\">01:44</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.18051</td><td class=\"sbody-td\">14,336</td><td class=\"sbody-td\">15-Jun-2009</td><td class=\"sbody-td\">15:10</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.18272</td><td class=\"sbody-td\">96,256</td><td class=\"sbody-td\">16-Jun-2010</td><td class=\"sbody-td\">16:30</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6001.18000</td><td class=\"sbody-td\">32,768</td><td class=\"sbody-td\">19-Jan-2008</td><td class=\"sbody-td\">08:02</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">372,224</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">14:52</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">48,128</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:41</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">14,336</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:41</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">96,256</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:41</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">32,768</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:42</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">296,960</td><td class=\"sbody-td\">02-Jul-2015</td><td class=\"sbody-td\">15:00</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">20-Feb-2015</td><td class=\"sbody-td\">02:03</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.18051</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">15-Jun-2009</td><td class=\"sbody-td\">14:51</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.18272</td><td class=\"sbody-td\">72,704</td><td class=\"sbody-td\">16-Jun-2010</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6002.18005</td><td class=\"sbody-td\">23,552</td><td class=\"sbody-td\">11-Apr-2009</td><td class=\"sbody-td\">06:26</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">296,960</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">14:17</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">72,704</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">23,552</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:32</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">778,752</td><td class=\"sbody-td\">02-Jul-2015</td><td class=\"sbody-td\">15:07</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">92,160</td><td class=\"sbody-td\">20-Feb-2015</td><td class=\"sbody-td\">01:26</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6001.18000</td><td class=\"sbody-td\">29,184</td><td class=\"sbody-td\">19-Jan-2008</td><td class=\"sbody-td\">08:26</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.18124</td><td class=\"sbody-td\">196,096</td><td class=\"sbody-td\">19-Oct-2009</td><td class=\"sbody-td\">13:31</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6001.18000</td><td class=\"sbody-td\">68,608</td><td class=\"sbody-td\">19-Jan-2008</td><td class=\"sbody-td\">08:28</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">778,752</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">14:22</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">92,160</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:02</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">29,184</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:02</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">196,096</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:02</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">68,608</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:02</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">296,960</td><td class=\"sbody-td\">02-Jul-2015</td><td class=\"sbody-td\">15:00</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.241</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">20-Feb-2015</td><td class=\"sbody-td\">02:03</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.18051</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">15-Jun-2009</td><td class=\"sbody-td\">14:51</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.18272</td><td class=\"sbody-td\">72,704</td><td class=\"sbody-td\">16-Jun-2010</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6002.18005</td><td class=\"sbody-td\">23,552</td><td class=\"sbody-td\">11-Apr-2009</td><td class=\"sbody-td\">06:26</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">296,960</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">14:17</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">72,704</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:30</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.0.6002.23742</td><td class=\"sbody-td\">23,552</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">15:32</td><td class=\"sbody-td\">x86</td></tr></table></div><h3 class=\"sbody-h3\">Windows 7 and Windows Server 2008 R2 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM, SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table: <br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.1.760<span class=\"text-base\">1</span>.<span class=\"text-base\">18</span>xxx</td><td class=\"sbody-td\">Windows 7 and Windows Server 2008 R2</td><td class=\"sbody-td\">SP1</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.1.760<span class=\"text-base\">1</span>.<span class=\"text-base\">22</span>xxx</td><td class=\"sbody-td\">Windows 7 and Windows Server 2008 R2</td><td class=\"sbody-td\">SP1</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 7</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">299,008</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:42</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">70,656</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">26,624</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:57</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">299,008</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:43</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">70,656</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">26,624</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 7 and Windows Server 2008 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">372,224</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:52</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">46,080</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">18:05</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">14,336</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">18:05</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">100,864</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">18:05</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">41,984</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">18:05</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">372,224</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:00</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">46,080</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">18:13</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">14,336</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">18:13</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">100,864</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">18:13</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">41,984</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">18:13</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">299,008</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:42</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">70,656</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">25,600</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:55</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">299,008</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:43</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">70,656</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">25,600</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:46</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2008 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">779,264</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:15</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">91,648</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:09</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">32,768</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:09</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">197,632</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:09</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">73,728</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:09</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">779,264</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:15</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">91,648</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:12</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">32,768</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:13</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">197,632</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:13</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">73,728</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:13</td><td class=\"sbody-td\">IA-64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">299,008</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:42</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">70,656</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:56</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.18914</td><td class=\"sbody-td\">25,600</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:55</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">299,008</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">16:43</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">34,304</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">10,240</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">70,656</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.1.7601.23117</td><td class=\"sbody-td\">25,600</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">17:46</td><td class=\"sbody-td\">x86</td></tr></table></div><h3 class=\"sbody-h3\">Windows 8 and Windows Server 2012 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM,SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.2.920 <span class=\"text-base\">0.16</span> xxx</td><td class=\"sbody-td\">Windows 8 and Windows Server 2012</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.2.920 <span class=\"text-base\">0.20</span> xxx</td><td class=\"sbody-td\">Windows 8 and Windows Server 2012</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 8</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">304,128</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:16</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">35,328</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:32</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">10,752</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:24</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">75,776</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:24</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:01</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">304,128</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:18</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">35,328</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:32</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">10,752</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">03:18</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">75,776</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">03:18</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">02:41</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 8 and Windows Server 2012</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">366,592</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:17</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">46,080</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:33</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">14,336</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:20</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">96,256</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:20</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:02</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">366,592</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:17</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">46,080</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:30</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">14,336</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">03:05</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">96,256</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">03:05</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">02:33</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">304,128</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:16</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">35,328</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:32</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">10,752</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:24</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">75,776</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:24</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.2.9200.16453</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">08-Nov-2012</td><td class=\"sbody-td\">04:01</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">304,128</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:18</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">35,328</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:32</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">10,752</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">03:18</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">75,776</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">03:18</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.2.9200.16384</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">26-Jul-2012</td><td class=\"sbody-td\">02:41</td><td class=\"sbody-td\">x86</td></tr></table></div><h3 class=\"sbody-h3\">Windows 8.1 and Windows Server 2012 R2 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (RTM,SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.3.920 <span class=\"text-base\">0.16</span> xxx</td><td class=\"sbody-td\">Windows 8.1 and Windows Server 2012 R2</td><td class=\"sbody-td\">RTM</td><td class=\"sbody-td\">GDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows 8.1</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">301,056</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:50</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">35,840</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:50</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">11,776</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:00</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">77,824</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:00</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:04</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows 8.1 and Windows Server 2012 R2</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">358,912</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:52</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">44,032</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:52</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">14,848</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:44</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">96,256</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:44</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:49</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmfd.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">301,056</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:50</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Atmlib.dll</td><td class=\"sbody-td\">5.1.2.242</td><td class=\"sbody-td\">35,840</td><td class=\"sbody-td\">03-Jul-2015</td><td class=\"sbody-td\">13:50</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Dciman32.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">11,776</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:00</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Fontsub.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">77,824</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:00</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Lpk.dll</td><td class=\"sbody-td\">6.3.9600.17415</td><td class=\"sbody-td\">3,072</td><td class=\"sbody-td\">29-Oct-2014</td><td class=\"sbody-td\">02:04</td><td class=\"sbody-td\">x86</td></tr></table></div></div><br/></div></div></div></div></div></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">How to obtain help and support for this security update</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">Help for installing updates: <a href=\"https://support.microsoft.com/ph/6527\" id=\"kb-link-17\" target=\"_self\">Support for Microsoft Update</a><br/><br/>Security solutions for IT professionals: <a href=\"https://technet.microsoft.com/security/bb980617.aspx\" id=\"kb-link-18\" target=\"_self\">TechNet Security Troubleshooting and Support</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href=\"https://support.microsoft.com/contactus/cu_sc_virsec_master\" id=\"kb-link-19\" target=\"_self\">Virus Solution and Security Center</a><br/><br/>Local support according to your country: <a href=\"https://support.microsoft.com/common/international.aspx\" id=\"kb-link-20\" target=\"_self\">International Support</a></div><br/></span></div></div></div></div></body></html>", "edition": 2, "published": "2015-07-14T00:00:00", "type": "mskb", "title": "MS15-077: Vulnerability in ATM font driver could allow elevation of privilege: July 14, 2015", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2015-2387"], "modified": "2015-07-14T17:11:13", "id": "KB3077657", "href": "https://support.microsoft.com/en-us/help/3077657/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-01-01T22:41:38", "description": "<html><body><p>Resolves a vulnerability in Windows that could allow elevation of privilege if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC).</p><h2>Summary</h2><div class=\"kb-summary-section section\"> This security update resolves a vulnerability in Windows that could allow elevation of privilege if an attacker who has access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a backup domain controller (BDC). To learn more about the vulnerability, see <a href=\"https://technet.microsoft.com/library/security/ms15-071\" id=\"kb-link-2\" target=\"_self\">Microsoft Security Bulletin MS15-071</a>. </div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><span class=\"text-base\">Important </span><ul class=\"sbody-free_list\"><li>All future security and nonsecurity updates for Windows Server 2012 R2 require update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-3\" target=\"_self\">2919355</a> to be installed. We recommend that you install update <a href=\"https://support.microsoft.com/en-us/help/2919355\" id=\"kb-link-4\" target=\"_self\">2919355</a> on your Windows Server 2012 R2-based computer so that you receive future updates. </li><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href=\"https://technet.microsoft.com/en-us/library/hh825699\" id=\"kb-link-5\" target=\"_self\">Add language packs to Windows</a>.<br/></li></ul><h3 class=\"sbody-h3\">Known issues in this security update</h3><ul class=\"sbody-free_list\"><li> This update includes the changes that originally shipped as part of security update <a href=\"https://support.microsoft.com/help/3002657\" id=\"kb-link-6\" target=\"_self\">3002657</a> (MS15-027). Therefore, computers that install this security update are subject to the information in the \u201cknown issues with this security update\u201d section of <a href=\"https://support.microsoft.com/help/3002657\" id=\"kb-link-7\" target=\"_self\">3002657</a>. Similarly, future versions of packages based on security updates 3002657 and 3068457 will inherit issues from dependent packages.<br/><br/><br/><br/><br/> For the latest status of an issue related to EMC Isilon OneFS, see <a href=\"https://support.emc.com/products/15209_isilon-onefs/advisories\" id=\"kb-link-8\" target=\"_self\">Technical and Security Advisories for Isilon OneFS</a>. <br/><br/><span>The third-party products that this article discusses are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, about the performance or reliability of these products.<br/></span></li></ul></div><h2>How to obtain and install the update</h2><div class=\"kb-resolution-section section\"><a class=\"bookmark\" id=\"obtaintheupdate\"></a><h3 class=\"sbody-h3\">Method 1: Windows Update</h3><div class=\"kb-collapsible kb-collapsible-expanded\">This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see<br/><a href=\"https://www.microsoft.com/security/pc-security/updates.aspx\" id=\"kb-link-10\" target=\"_self\">Get security updates automatically</a>.<br/></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Method 2: Microsoft Download Center</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.<br/><br/>Click the download link in <a href=\"https://technet.microsoft.com/library/security/ms15-071\" id=\"kb-link-11\" target=\"_self\">Microsoft Security Bulletin MS15-071</a> that corresponds to the version of Windows that you are running.<br/></div><br/></span></div></div></div></div><h2>More Information</h2><div class=\"kb-moreinformation-section section\"><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">Security update deployment information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><h4 class=\"sbody-h4\">Windows Server 2003 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\">Security update file names</td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3068457-x86-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3068457-x64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2003:<br/><span class=\"text-base\">WindowsServer2003-KB3068457-ia64-ENU.exe</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Installation switches</td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-12\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Update Log File</td><td class=\"sbody-td\">KB3068457.log</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Restart requirement</td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Removal information</td><td class=\"sbody-td\">Use <span class=\"text-base\">Add or Remove</span> Programs item in <span class=\"text-base\">Control Panel</span> or the Spuninst.exe utility located in the %Windir%\\$NTUninstallKB3068457$\\Spuninst folder</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">File information</td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Registry key verification</td><td class=\"sbody-td\">HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Updates\\Windows Server 2003\\SP3\\KB3068457\\Filelist</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file names</span></td><td class=\"sbody-td\">For all supported 32-bit editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3068457-x86.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3068457-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008:<br/><span class=\"text-base\">Windows6.0-KB3068457-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-13\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click <span class=\"text-base\">Control Panel</span>, and then click <span class=\"text-base\">Security</span>. Under Windows Update, click <span class=\"text-base\">View installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2008 R2 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported x64-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3068457-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported Itanium-based editions of Windows Server 2008 R2:<br/><span class=\"text-base\">Windows6.1-KB3068457-ia64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-14\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, and then under Windows Update, click <span class=\"text-base\">View installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div><h4 class=\"sbody-h4\">Windows Server 2012 and Windows Server 2012 R2 (all editions)</h4><span class=\"text-base\">Reference Table</span><br/><br/>The following table contains the security update information for this software.<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Security update file name</span></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012:<br/><span class=\"text-base\">Windows8-RT-KB3068457-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"></td><td class=\"sbody-td\">For all supported editions of Windows Server 2012 R2:<br/><span class=\"text-base\">Windows8.1-KB3068457-x64.msu</span></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Installation switches</span></td><td class=\"sbody-td\">See <a href=\"https://support.microsoft.com/help/934307\" id=\"kb-link-15\" target=\"_self\">Microsoft Knowledge Base Article 934307</a></td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Restart requirement</span></td><td class=\"sbody-td\">Yes, you must restart your system after you apply this security update.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Removal information</span></td><td class=\"sbody-td\">To uninstall an update installed by WUSA, use the <span class=\"text-base\">/Uninstall</span> setup switch or click <span class=\"text-base\">Control Panel</span>, click <span class=\"text-base\">System and Security</span>, click <span class=\"text-base\">Windows Update</span>, and then under See also, click <span class=\"text-base\">Installed updates</span> and select from the list of updates.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">File information</span></td><td class=\"sbody-td\">See the <a bookmark-id=\"fileinfo\" href=\"#fileinfo\" managed-link=\"\" target=\"\">file information</a> section.</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\"><span class=\"text-base\">Registry key verification</span></td><td class=\"sbody-td\"><span class=\"text-base\">Note</span> A registry key does not exist to validate the presence of this update.</td></tr></table></div></div><br/></span></div></div></div><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File hash information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\"><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">SHA1 hash</th><th class=\"sbody-th\">SHA256 hash</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3068457-ia64.msu</td><td class=\"sbody-td\">9F1E4E0BE5893C59616BB1B3A179BC9DF6D89A79</td><td class=\"sbody-td\">940959C644BBCAB18B0A3A535827EC3F721D610367898E7F54ED1FE4B339D4EE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3068457-x64.msu</td><td class=\"sbody-td\">21C7807C6C8A28EC735753F67F9FAB3E7A91FD33</td><td class=\"sbody-td\">508C1543886B107981851A76221528A8CFD3BB43D12D94573C7E1C0C1F453089</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.0-KB3068457-x86.msu</td><td class=\"sbody-td\">0F23A13159F4AD7D4DC6E1F0D08AD79CB08E80DB</td><td class=\"sbody-td\">535C82B8001961F1BBB1D3A4FE9D135DB75ABCBF28F6A2A3A9A6E7D9AE84006E</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3068457-ia64.msu</td><td class=\"sbody-td\">7A57B516226FAB41F49D19BDCDAD33FC1EF49D73</td><td class=\"sbody-td\">770E320C5CBCA8151C8FDBD56D3ECF2C262EE5118799FAD353184A8B5C3EE315</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3068457-x64.msu</td><td class=\"sbody-td\">08099524A2DE2710A6E5F34978A248D36483E5CC</td><td class=\"sbody-td\">0DC84D3DC58C18C809B189A2BEE1F55400E1E03DED282B944769BC5B8FFB8B8A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows6.1-KB3068457-x86.msu</td><td class=\"sbody-td\">66ED7496DD7B3124A841BB42B8E3FD1AFA6D2BEC</td><td class=\"sbody-td\">F003206F461618B86C50D8ACECA18BFAA274F992484F00AC02741C4E7653B28F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3068457-arm.msu</td><td class=\"sbody-td\">82BADB8238690C4ED50381DBB5309643D00BC895</td><td class=\"sbody-td\">27C72AB0B27AF7E9AFF18EACEA4202717BA090F5598DAA6A36083F20B52C8F3A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3068457-x64.msu</td><td class=\"sbody-td\">3D07C959DA9BCA37E1AFC341FD6562279C4A4017</td><td class=\"sbody-td\">954D114830C8AD3D62EDAEEF62C88EB7E937B828425B5610237C32038AEDC566</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8.1-KB3068457-x86.msu</td><td class=\"sbody-td\">01C79A81A9DCCB6355B5E99FC7617E03BA2D8323</td><td class=\"sbody-td\">611DB367B1690D5386C954AA2B583BDE6EB924573345542E0849BFBADA9EADF8</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3068457-arm.msu</td><td class=\"sbody-td\">F1AC9AECF6948A9D45BF98C89F638BE6AD6C9372</td><td class=\"sbody-td\">F7317DAA7C5FDA9CF3A999F3F2C5CE944C1C44A55BC6FD844E6219D2C3D51FE4</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3068457-x64.msu</td><td class=\"sbody-td\">D3BB57A8278F1ADAB2E77FDDEB48428649BF5D92</td><td class=\"sbody-td\">67831B90B121FB7E3350511709A321C094B94762ED85416545E7B9A2AD192AA0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Windows8-RT-KB3068457-x86.msu</td><td class=\"sbody-td\">B76252F9D63812A9EA1D1E7D3E832E03B8F537EC</td><td class=\"sbody-td\">A7761E85158B05A509A1D02CCD9B2D7574975BBBD96216CB2E5CF003CC2379AB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-ia64-DEU.exe</td><td class=\"sbody-td\">EE06495C490CD4EF37D3D155DE7351CD90D48B28</td><td class=\"sbody-td\">47C8894B54E10B9F9C98D6C63F09995BCE9D6AEECDC2CABEFCD97E49AD3FC0C7</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-ia64-ENU.exe</td><td class=\"sbody-td\">22EFFA7A03FCBC284763BB4A7BBECCEBD4A118C5</td><td class=\"sbody-td\">1B6A1F948303CAD48E72FF8AD11F8A888BA80F4A56A1086C9B3562CEB2FF0B44</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-ia64-FRA.exe</td><td class=\"sbody-td\">0023AB28A6FAFCD88F3B12D9DA2187B83EABC359</td><td class=\"sbody-td\">60EF1584773C4386C24A5AB24D87C2675DD906888D3C0D2E2BA562950EE8D646</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-ia64-JPN.exe</td><td class=\"sbody-td\">E2FC34F4D63C5C78AAB74BE34DA5AADBC3B54F4C</td><td class=\"sbody-td\">2AABB5A0A752A3CAD37B1F4B603F68D705163BDF81E9712ADC56B19515F3D1EF</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-CHS.exe</td><td class=\"sbody-td\">4759C99EBEA578CA5AF74C0CCADAC605AAA44E50</td><td class=\"sbody-td\">DB87B3D676941DA7F9B9888D68C90800ED6717E2CCCA9FD133C03D6AF039875A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-CHT.exe</td><td class=\"sbody-td\">2B1A3D40A8D43827D1D422F0463116F885415239</td><td class=\"sbody-td\">A7FB089B1A0E4276E24646B99FB7CC275CBB2BB71C01496271FA854211B5C099</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-DEU.exe</td><td class=\"sbody-td\">7F7CBC74A56A91A125CF4C2489D4115C957FF182</td><td class=\"sbody-td\">784ED75E0B1053A956B939638300E98B8CA1832E4E020D8FC8CC3F3AA61F39FB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-ENU.exe</td><td class=\"sbody-td\">7ABB9CEAD90E58FC4E54EB1B7609EF15D9337661</td><td class=\"sbody-td\">40C7399E33EA954AC7A1D679685013EC8A87FB5327E361BC418A33502E9E5D0D</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-ESN.exe</td><td class=\"sbody-td\">043950C0D4A188F49403DF0513311067FE5BEED9</td><td class=\"sbody-td\">A403B5832FE949A6B05144C2244F1BDB287368858B78BA2F6F7D40D6BB7A21FB</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-FRA.exe</td><td class=\"sbody-td\">7A1B1DED9EB6C2E7FF27A70BF2145CD16D8D522D</td><td class=\"sbody-td\">A9DCD0E97F44BE17A8AA8A673AFCDCE64763DB202FC8F33AD4DFD371CDD6BD10</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-ITA.exe</td><td class=\"sbody-td\">7C71A38FB32E571D787D7B94C688C011F1A7DA22</td><td class=\"sbody-td\">CD291205D3A2C9E59D9DB633AB452CEA0B40783683FA8EC9BD8153DE6E058742</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-JPN.exe</td><td class=\"sbody-td\">7F0D57A1A29659B1B53FD71469CDB277326516F7</td><td class=\"sbody-td\">5070DDB02579A9ACF5658C62FC1EB0C86CA84EEA1F39D283A9AFBE9B3203EDD0</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-KOR.exe</td><td class=\"sbody-td\">1B357D73DFEC807A1331EC6415DDDFEDBE898921</td><td class=\"sbody-td\">E5BD402CE650E6F5313EEE27D8060B5831DF33FAA5C198141C414896DD8CF91A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-PTB.exe</td><td class=\"sbody-td\">7431C993C02553196C0F6DB441410BB0CCD6F523</td><td class=\"sbody-td\">DE220DF0166A2CBCF29A78365FD39D5935E4CFC441A9B48C9FAABD17A96A074B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x64-RUS.exe</td><td class=\"sbody-td\">E93FFD2A1E8744E35C5D9A794DA3B2952BB6DEF9</td><td class=\"sbody-td\">A65690F7D0BDCC5BF6946266BE7AD7F054BEB48164522270190D53C426CD6304</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-CHS.exe</td><td class=\"sbody-td\">EA1573F3FBDBEF158A0E9A3568558523F517A3A2</td><td class=\"sbody-td\">CE8B9B129B427DAA6907491D1998D6C879A1306C58A88591B1B2E6229B16200A</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-CHT.exe</td><td class=\"sbody-td\">8F8E87F1361061EB2605D94DDFEFC08BF686EB4B</td><td class=\"sbody-td\">FE21D350AED01AED6CB82E3B7BA930EC0BBE8B9CA7D4837C5F39994E469ACDCE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-CSY.exe</td><td class=\"sbody-td\">2AF33DDB85BC19E2D0C5EE56ED9464ACB7654A6B</td><td class=\"sbody-td\">CC57C68C2A99CF355AA78F428E1FD3CAB29FF895B6CD4D63716D37CB03C0F320</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-DEU.exe</td><td class=\"sbody-td\">E594D4586EAD9047D6FA4CA766BC5D9631C6651B</td><td class=\"sbody-td\">9002F0E9F6BBDFD44EFBF0DC6D655C47BD93CA5572BD39DC63E07E22AD6DBA76</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-ENU.exe</td><td class=\"sbody-td\">E4720BDBC54688E048D22508B0A975BD92CAB582</td><td class=\"sbody-td\">43688B0F5F4E8117647BAC35B2E11FA641305DDA97FABCFF9F1417E45E25A293</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-ESN.exe</td><td class=\"sbody-td\">AC4B69A330DB72491E2F4C2142C88AC3A8D8AAC2</td><td class=\"sbody-td\">94470058B8FC0BBDC6BAB550C5426C6D81A370969E5AE99AA7B8BAEB0EFAE72B</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-FRA.exe</td><td class=\"sbody-td\">AA9EB3396A54E92F31F2FAADD53F4E51B22563D1</td><td class=\"sbody-td\">3715FB433E57BBE7B83C848A15F430E2FF7BEE473AA42285D024A4A55923BDDC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-HUN.exe</td><td class=\"sbody-td\">9410D9092D57A1EC03EEFC7E9132FF3214EFCEDC</td><td class=\"sbody-td\">3339D3CFAAE5DD185829E6833F793DEB3EF46FF8860C74DC0564A6D98B52E8BC</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-ITA.exe</td><td class=\"sbody-td\">6050E45DB74B1AFF52FA518EB9D46FAFA3389350</td><td class=\"sbody-td\">DDAF2EF88BDFE3ECE10FFFD1723316B03402EF6EDD535EE56F126E600D35328F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-JPN.exe</td><td class=\"sbody-td\">3B57BD75AFE6C181FF0A6BF90EA376389D259B85</td><td class=\"sbody-td\">1B9DEDBF1A30BB16C2704F5E9153493D89AC57D1B2D486E12B34C525EA542A67</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-KOR.exe</td><td class=\"sbody-td\">F9388AA2923FD551FB005FD54955312F094EE1F1</td><td class=\"sbody-td\">BD00247080CB79AE9E18257A1E778436B75BCFE40BB672DAD4FE1DA8318D145C</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-NLD.exe</td><td class=\"sbody-td\">341CBF4AD40BB96E7218B05A8AD86250B301B49F</td><td class=\"sbody-td\">743885A988764DAB94834B8E9A1FEB5122DF9088280D7A93DA404BC9F542BAA1</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-PLK.exe</td><td class=\"sbody-td\">698B0E3D854BF4AC4D743E23B44F7927A44E846A</td><td class=\"sbody-td\">2D1C2CA6150F14DDE7B0B5B5523FE170BA81F9F3F31111CB02494A45A2630DA3</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-PTB.exe</td><td class=\"sbody-td\">5A2FAE7D2E56A6635361846F42FE52CDD06A6915</td><td class=\"sbody-td\">CD04E6117B34DB5419A260A0B1876188AC2C46CA57F7B033E5E0E207E67F4B52</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-PTG.exe</td><td class=\"sbody-td\">2994A215558797E3CB907463A5DA322EDB19C483</td><td class=\"sbody-td\">13DE410EB68CED201C7346382B724411DF1317EB9C23F18738EBBCC21F502C25</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-RUS.exe</td><td class=\"sbody-td\">776017AA640D1050A6EE23A6C4823BCED1E21682</td><td class=\"sbody-td\">D5651A4D9E0F2C6975139313FF2168550D301595E7E5715D025FF41FE16EC36F</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-SVE.exe</td><td class=\"sbody-td\">EAFD4CC98185151FF6F209E82758A4A4CC07160B</td><td class=\"sbody-td\">B22F8EF2F6BE8F7F837A97A25FC8C7734F3D59B457DA8B1C0141FDEFFA925C66</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">WindowsServer2003-KB3068457-x86-TRK.exe</td><td class=\"sbody-td\">FD3300A8F34B56AA9AB33C4EC9E767E053A0DECA</td><td class=\"sbody-td\">3868AE3A807FA49D0C6196DDF1093E20B11951CB95F986D29E4CDE78625CC5DD</td></tr></table></div></div><br/></span></div></div></div><a class=\"bookmark\" id=\"fileinfo\"></a><div class=\"faq-section\" faq-section=\"\"><div class=\"faq-panel\"><div class=\"faq-panel-heading\" faq-panel-heading=\"\"><span class=\"link-expand-image\"><span class=\"faq-chevron win-icon win-icon-ChevronUpSmall\"></span></span><span class=\"bold btn-link link-expand-text\"><span class=\"bold btn-link\">File information</span></span></div><div class=\"faq-panel-body\" faq-panel-body=\"\"><span><div class=\"kb-collapsible kb-collapsible-collapsed\">The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.<br/><br/><h3 class=\"sbody-h3\">Windows Server 2003 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific milestone (SP<strong class=\"sbody-strong\">n</strong>) and service branch (QFE, GDR) are noted in the \"SP requirement\" and \"Service branch\" columns.</li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.</li><li>In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KB<strong class=\"sbody-strong\">number</strong>.cat) that is signed with a Microsoft digital signature.</li></ul><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">SP requirement</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">5.2.3790.5648</td><td class=\"sbody-td\">692,736</td><td class=\"sbody-td\">09-Jun-2015</td><td class=\"sbody-td\">22:11</td><td class=\"sbody-td\">x64</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">SP2QFE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Wnetlogon.dll</td><td class=\"sbody-td\">5.2.3790.5648</td><td class=\"sbody-td\">439,808</td><td class=\"sbody-td\">09-Jun-2015</td><td class=\"sbody-td\">22:11</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">SP2QFE\\WOW</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">5.2.3790.5648</td><td class=\"sbody-td\">439,808</td><td class=\"sbody-td\">09-Jun-2015</td><td class=\"sbody-td\">21:49</td><td class=\"sbody-td\">x86</td></tr></table></div><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">5.2.3790.5648</td><td class=\"sbody-td\">439,808</td><td class=\"sbody-td\">09-Jun-2015</td><td class=\"sbody-td\">21:49</td><td class=\"sbody-td\">x86</td></tr></table></div><h4 class=\"sbody-h4\">For all supported IA-64-based versions of Windows Server 2003</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th><th class=\"sbody-th\">SP requirement</th><th class=\"sbody-th\">Service branch</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">5.2.3790.5648</td><td class=\"sbody-td\">995,328</td><td class=\"sbody-td\">09-Jun-2015</td><td class=\"sbody-td\">22:11</td><td class=\"sbody-td\">IA-64</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">SP2QFE</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Wnetlogon.dll</td><td class=\"sbody-td\">5.2.3790.5648</td><td class=\"sbody-td\">439,808</td><td class=\"sbody-td\">09-Jun-2015</td><td class=\"sbody-td\">22:11</td><td class=\"sbody-td\">x86</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">SP2QFE\\WOW</td></tr></table></div><h3 class=\"sbody-h3\">Windows Server 2008 file information</h3><div class=\"kb-collapsible kb-collapsible-collapsed\"><ul class=\"sbody-free_list\"><li>The files that apply to a specific product, milestone (SP<strong class=\"sbody-strong\">n</strong>), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:<br/><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\"><span class=\"text-base\">Version</span></th><th class=\"sbody-th\"><span class=\"text-base\">Product</span></th><th class=\"sbody-th\"><span class=\"text-base\">Milestone</span></th><th class=\"sbody-th\"><span class=\"text-base\">Service branch</span></th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.0.600<span class=\"text-base\">2</span>.<span class=\"text-base\">18</span><strong class=\"sbody-strong\">xxx</strong></td><td class=\"sbody-td\">Windows Server 2008 SP2</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">GDR</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">6.0.600<span class=\"text-base\">2</span>.<span class=\"text-base\">23</span><strong class=\"sbody-strong\">xxx</strong></td><td class=\"sbody-td\">Windows Server 2008 SP2</td><td class=\"sbody-td\">SP2</td><td class=\"sbody-td\">LDR</td></tr></table></div></li><li>GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.</li></ul><span class=\"text-base\">Note</span> The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.<br/><br/><h4 class=\"sbody-h4\">For all supported x86-based versions of Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:21</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">204,800</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:20</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">204,800</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:13</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">212,992</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:11</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:04</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">237,568</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:03</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:07</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">253,952</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:05</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">15:36</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">204,800</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">15:35</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:18</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">233,472</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:16</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:05</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">200,704</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:04</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:09</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">237,568</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:08</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:20</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">200,704</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:08</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">221,184</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:07</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:45</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">221,184</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:44</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">5,632</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">131,072</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:40</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">5,632</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:04</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">126,976</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:03</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:14</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">200,704</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:13</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:16</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">221,184</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:15</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:10</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">221,184</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:09</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:02</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">221,184</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:01</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">8,192</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:20</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">229,376</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:15</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">208,896</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:14</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:11</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">204,800</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:10</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:14</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">200,704</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:12</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">4,608</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:58</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">94,208</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:57</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">5,120</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:39</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">98,304</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:38</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">6.0.6002.19409</td><td class=\"sbody-td\">593,920</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:04</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Nlsvc.mof</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">2,873</td><td class=\"sbody-td\">03-Jan-2008</td><td class=\"sbody-td\">19:07</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">598,016</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">15:33</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Nlsvc.mof</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">2,873</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:46</td><td class=\"sbody-td\">Not applicable</td></tr></table></div><h4 class=\"sbody-h4\">For all supported x64-based versions of Windows Server 2008</h4><div class=\"table-responsive\"><table class=\"sbody-table table\"><tr class=\"sbody-tr\"><th class=\"sbody-th\">File name</th><th class=\"sbody-th\">File version</th><th class=\"sbody-th\">File size</th><th class=\"sbody-th\">Date</th><th class=\"sbody-th\">Time</th><th class=\"sbody-th\">Platform</th></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,144</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:51</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">194,048</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:50</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:49</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">194,560</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:48</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:46</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">203,776</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:45</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:28</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">227,840</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:27</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">19:21</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">244,224</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">19:20</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,144</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">15:27</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">194,560</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">15:26</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:57</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">222,720</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:55</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:55</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">192,512</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:53</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:11</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">227,840</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:10</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,144</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:25</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">193,024</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:24</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:30</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">211,968</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:29</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">19:24</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">212,992</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">19:22</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">5,120</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">19:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">123,392</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">19:18</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">5,120</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:07</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">118,272</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:06</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,144</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:22</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">189,952</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:21</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:13</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">210,944</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:12</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:21</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">213,504</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:18</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">212,480</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:16</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:59</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">221,696</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:57</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:15</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">200,192</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:14</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">19:26</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">196,096</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">19:24</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:20</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">191,488</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">4,096</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">85,504</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:39</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">4,608</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:48</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">88,064</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:47</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">6.0.6002.19409</td><td class=\"sbody-td\">717,824</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">15:42</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Nlsvc.mof</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">2,873</td><td class=\"sbody-td\">03-Jan-2008</td><td class=\"sbody-td\">18:12</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">722,432</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">15:23</td><td class=\"sbody-td\">x64</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Nlsvc.mof</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">2,873</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:46</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">6.0.6002.19409</td><td class=\"sbody-td\">593,920</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:04</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Nlsvc.mof</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">2,873</td><td class=\"sbody-td\">03-Jan-2008</td><td class=\"sbody-td\">19:07</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netlogon.dll</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">598,016</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">15:33</td><td class=\"sbody-td\">x86</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Nlsvc.mof</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">2,873</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:46</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">6,656</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:21</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">204,800</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">17:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:20</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">204,800</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">16:19</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,168</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:13</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Netmsg.dll.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">212,992</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:11</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Bootfix.bin</td><td class=\"sbody-td\">Not applicable</td><td class=\"sbody-td\">1,024</td><td class=\"sbody-td\">07-May-2014</td><td class=\"sbody-td\">23:41</td><td class=\"sbody-td\">Not applicable</td></tr><tr class=\"sbody-tr\"><td class=\"sbody-td\">Expand.exe.mui</td><td class=\"sbody-td\">6.0.6002.23716</td><td class=\"sbody-td\">7,680</td><td class=\"sbody-td\">10-Jun-2015</td><td class=\"sbody-td\">18:04</td><td class=\"sbody-td\">Not applicable</td></tr><tr