Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Microsoft security advisory 4025685: Guidance for older platforms: June 13, 2017


View products that this article applies to.

Summary

Microsoft has released a security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To learn more about the vulnerability, go to advisory 4025685.

↑ Back to the top


Guidance for older platforms

This section summarizes resources for customers who are running Windows XP, Windows Vista, Windows 8, or Windows Server 2003. At the time of release of this advisory (June 13, 2017), these platforms are no longer in mainstream or extended support. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.

Note This update does not check for Windows Genuine Advantage status.

For customers on these older platforms, the following tables provide information to manually download applicable security updates. Microsoft’s decision to release security updates for the additional platforms today should not be interpreted as a change in policy. Customers are encouraged to upgrade to a supported platform.

↑ Back to the top


Vulnerability information

For more information about individual vulnerabilities addressed by these releases, follow the links at the top of each column.

Older platforms table 1 of 3

Operating system

MS08-067

MS09-050

MS10-061

MS14-068

MS17-010

MS17-013

Windows XP

Windows XP Service Pack 3

958644

Not affected

2347290

Not affected

4012598

4012583

Microsoft Windows XP Professional x64 Edition Service Pack 2

958644

Not affected

2347290

Not affected

4012598

4012583

Windows Server 2003

Windows Server 2003 Service Pack 2

958644

Not affected

2347290

3011780

4012598

4012583

Windows Server 2003 x64 Edition Service Pack 2 958644 Not affected 2347290 3011780 4012598 4012583

Windows Vista

Windows Vista Service Pack 2

Not affected

975517

2347290

Not affected

4012598

Not affected

Windows Vista x64 Edition Service Pack 2

Not affected

975517

2347290

Not affected

4012598

Not affected

Windows 8

Windows 8 for 32-bit Systems

Not affected

Not affected

Not affected

Not affected

4012598

4012583

Windows 8 for x64-based Systems

Not affected

Not affected

Not affected

Not affected

4012598

4012583

 

Older platforms table 2 of 3

Operating system

CVE-2017-0176

CVE-2017-0222

CVE-2017-0267 to 0280

CVE-2017-7269

CVE-2017-8461

CVE-2017-8464

Windows XP

Windows XP Service Pack 3

4022747

Internet Explorer 8
4018271

4018466

3197835

4024323

Not affected

Microsoft Windows XP Professional x64 Edition Service Pack 2

4022747

Internet Explorer 8
4018271

4018466

3197835

4024323

Not affected

Windows Server 2003

Windows Server 2003 Service Pack 2

4022747

Mitigated in default scenarios [1]

4018466

3197835

4024323

Not affected

Windows Server 2003 x64 Edition Service Pack 2

4022747

Mitigated in default scenarios [1]

4018466

3197835

4024323

Not affected

Windows Vista

Windows Vista Service Pack 2

Not affected

Internet Explorer 9
4018271

4018466

Not affected

Not affected

4021903

Windows Vista x64 Edition Service Pack 2

Not affected

Internet Explorer 9
4018271

4018466

Not affected

Not affected

4021903

Windows 8

Windows 8 for 32-bit Systems

Not affected

Internet Explorer 10
4018271

4019623

Not affected

Not affected

4022839

Windows 8 for x64-based Systems

Not affected

Internet Explorer 10
4018271

4019623

Not affected

Not affected

4022839

 

[1] - By default, Internet Explorer on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted web content on a server. This is a mitigating factor for websites that you have not added to the Internet Explorer Trusted sites zone.

 

Older platforms table 3 of 3

Operating system

CVE-2017-8487

CVE-2017-8543

CVE-2017-8552

Windows XP

Windows XP Service Pack 3

4025218

4024402

4019204

Microsoft Windows XP Professional x64 Edition Service Pack 2

4025218

4024402

4019204

Windows Server 2003

Windows Server 2003 Service Pack 2

4025218

4024402

4019204

Windows Server 2003 x64 Edition Service Pack 2

4025218

4024402

4019204

Windows Vista

Windows Vista Service Pack 2

Not affected

4024402

4019204

Windows Vista x64 Edition Service Pack 2

Not affected

4024402

4019204

Windows 8

Windows 8 for 32-bit Systems

Not affected

4022839

4022839

Windows 8 for x64-based Systems

Not affected

4022839

4022839

↑ Back to the top


Frequently asked questions

I am running Internet Explorer on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2. Does this mitigate these vulnerabilities?
Yes. By default, Internet Explorer on Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted web content on a server. This is a mitigating factor for websites that you have not added to the Internet Explorer Trusted sites zone.

Are these new releases for these platforms?
No. To help customers understand support for all platforms related to these updates we have assembled this page to discuss operating system versions that are in mainstream or extended support.

My operating system version is not listed here. Are updates available for other versions?
For newer operating systems still in mainstream or extended support, refer to this page. For other variations of operating systems listed above (i.e., RTM or different service pack levels), there are no updates available. Customers should update to the latest service pack version to receive security updates.

↑ Back to the top


Keywords: atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew, kb

↑ Back to the top

Article Info
Article ID : 4025687
Revision : 29
Created on : 4/13/2020
Published on : 4/16/2020
Exists online : False
Views : 468