Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS16-076: Description of the security update for Netlogon: June 14, 2016


View products that this article applies to.

Summary

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker with access to a primary domain controller (PDC) on a target network runs a specially crafted application to establish a secure channel to the PDC as a replica domain controller.


To learn more about the vulnerability, see Microsoft Security Bulletin MS16-076.

↑ Back to the top


More Information

Important
  • All future security and non-security updates for Windows Server 2012 R2 require update 2919355 to be installed. We recommend that you install update 2919355 on your Windows Server 2012 R2-based computer so that you receive future updates.
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Update FAQ

Why is security update 3161561 in this bulletin also denoted in MS16-075
Security update 3161561 is also denoted in MS16-075 for supported releases of Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 due to the way fixes for vulnerabilities affecting particular products are consolidated. Because bulletins are broken out by the vulnerabilities being addressed, not by the update package being released, it is possible for separate bulletins, each addressing distinctly different vulnerabilities, to list the same update package as the vehicle for providing their respective fixes. This is frequently the case with cumulative updates for products, such as Internet Explorer or Silverlight, where singular security updates address different security vulnerabilities in separate bulletins.



Note Users do not need to install identical security updates that ship with multiple bulletins more than once.

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see
Get security updates automatically.
Method 2: Microsoft Download Center
You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

Click the download link in Microsoft Security Bulletin MS16-076 that corresponds to the version of Windows that you are running.

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support

↑ Back to the top


File Information

File hash information
File nameSHA1 hashSHA256 hash
Windows8.1-KB3162343-x64.msuF6F76020D72D633995DBB1DBFEE681F9A74B76436BF219FB16286EC78C706DDF98134925E2C3098D7BF28032C4C0F9FB8C5F576E

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). Be aware that dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time bias. The dates and times may also change when you perform certain operations on the files.

Windows Server 2012 R2 file information

Notes
  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.3.960 0.16xxx Windows Server 2012 R2RTMGDR
    6.3.960 0.17xxxWindows Server 2012 R2RTMGDR
    6.3.960 0.18xxxWindows Server 2012 R2RTMGDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatform
Wdigest.dll6.3.9600.18334227,32806-May-201616:04x64
Wdigest.dll6.3.9600.18334193,02406-May-201615:35x86

↑ Back to the top


Keywords: kbsurveynew, kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, kbbug, kblangall, kbfix, kbexpertiseinter, kb, atdownload, kbmustloc

↑ Back to the top

Article Info
Article ID : 3162343
Revision : 1
Created on : 1/7/2017
Published on : 6/14/2016
Exists online : False
Views : 240