Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS12-017: Vulnerability in DNS Server could allow denial of service: March 13, 2012


View products that this article applies to.

INTRODUCTION

Microsoft has released security bulletin MS12-017. To view the complete security bulletin, visit one of the following Microsoft websites:

How to obtain help and support for this security update



Help protect your PC from viruses and from malware:
Help installing updates:
Security solutions for IT professionals:
Local support according to your country:

↑ Back to the top


More Information

Known issues with this security update

  • Symptoms
    After you install this security update, the DNS Server service may not start, or you may receive an access violation error message shortly after the service starts, or after the operating system starts.





    Cause
    This issue may occur if DNS is configured to have a CNAME and a SOA record that both exist for the "@" record. The "@" record identifies the root of a DNS zone. This can frequently be identified in the DNS Manager as a record with the "(same as parent folder)" name. The SOA and NS records are allowed in this folder. RFC 2181 describes name uniqueness checks for CNAME records. According to RFC 2181, the CNAME may not exist in the “same as parent folder" ("@") of a zone.

    Workaround
    To avoid this issue, identify and remove the "@" CNAME record that is causing the issue from the misconfigured zone before you install security update 2647170.

    To help identify problematic zones, run the following sample PowerShell script. PowerShell is installed by default in Windows Server 2008 R2. PowerShell must be installed as a feature in Windows Server 2008 and must be manually installed in Windows Server 2003.



    $count = 0
    $var = get-wmiobject -query "select * from win32_service where name = 'dns'"
    if ($var -ne $null)
    {
    if ($var.state.tolower() -eq "running")
    {
    [array] $global:badcnamedomains = $null
    $var = get-wmiobject -namespace "root\microsoftdns" -query "select * from microsoftdns_zone"
    if ($var -ne $null)
    {
    foreach ($var2 in $var)
    {
    $query = "select * from microsoftdns_cnametype where containername = '" + $var2.name + "'"
    $var3 = get-wmiobject -namespace "root\microsoftdns" -query $query | where {$_.ownername -eq $var2.name}
    if ($var3 -ne $null)
    {
    $count += 1
    $global:badcnamedomains += $var3.domainname
    }
    }
    }
    else
    {
    write-host "No zones returned"
    }
    }
    }
    if ($count -gt 0)
    {
    write-host "Total number of zones found: $count"
    write-host "The zones are:"
    write-host $global:badcnamedomains
    }
    elseif ($count -eq 0)
    {
    write-host "No zones found with the issue"
    }
    $count = $null
    $global:badcnamedomains = $null


    Microsoft provides programming examples for illustration only, without warranty either expressed or implied. This includes, but is not limited to, the implied warranties of merchantability or fitness for a particular purpose. This article assumes that you are familiar with the programming language that is being demonstrated and with the tools that are used to create and to debug procedures. Microsoft support engineers can help explain the functionality of a particular procedure. However, they will not modify these examples to provide added functionality or construct procedures to meet your specific requirements.

    To run the sample PowerShell script, copy the text, and then paste it into a PowerShell Command Prompt window that is running with administrative permissions. The script will identify CNAME records that conflict with SOA records in locally held DNS zones. To delete the CNAME records that do not comply with RFC 2181, type the following command at command prompt, and then press Enter:
    DNSCMD /recorddelete DNS zone name @ cname

    To resolve the problem if the access violation error has already occurred
    If you already have installed security update 2647170 before removing the offending CNAME record, you may have to roll back to the previously installed version of DNS. Then, remove the conflicting @ CNAME record from the misconfigured zone, and then reinstall security update 2647170.

↑ Back to the top


FILE INFORMATION

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows Server 2003 file information

  • The files that apply to a specific milestone (SPn) and service branch (QFE, GDR) are noted in the "SP requirement" and "Service branch" columns.
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.
  • In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KBnumber.cat) that is signed with a Microsoft digital signature.

For all supported x64-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimeHashesPlatformSP requirementService branch
Afd.sys5.2.3790.4949291,84010-Feb-201220:15MD5: 886C37D055020D0D02C35AC5B84E76AB
SHA1: A523C54235D964DA17513338BDC9A0E6E3AAD5F5
x64SP2SP2GDR
Dns.exe5.2.3790.4957779,26410-Feb-201220:15MD5: AF2785422B498345592CBD768DE0FE76
SHA1: C813D869F25AE37500CECE289286E85F8DFC8E88
x64SP2SP2GDR
Dnsperf.dll5.2.3790.446014,33610-Feb-201220:15MD5: 979DEE0E02C3E5301F80429DAC3ECFE9
SHA1: F48FB903280F8715EF277B9AF39AEED77242F1C7
x64SP2SP2GDR
Dnsperf.hNot Applicable6,64210-Feb-201220:15Not ApplicableNot ApplicableSP2SP2GDR
Dnsperf.iniNot Applicable11,59710-Feb-201220:15Not ApplicableNot ApplicableSP2SP2GDR
Mswsock.dll5.2.3790.4318492,54410-Feb-201220:15MD5: BA13C3C32A69DC37653C9543E065950E
SHA1: A8663E473C9C4C754CB82FF5D1CBBC07223158CC
x64SP2SP2GDR
Tcpip.sys5.2.3790.4573781,82410-Feb-201220:15MD5: 63BDEDB15B038C45B94079CEF3147A8D
SHA1: F7C02B7137E9F8D83963C99AB522D40BB00D895A
x64SP2SP2GDR
Tcpip6.sys5.2.3790.4662394,11210-Feb-201220:15MD5: 52CE5A6707C29DF8662B6067C217B557
SHA1: 0B5EB48A0BDCA7B1A2523F67814B5B0492731F24
x64SP2SP2GDR
W03a3409.dll5.2.3790.471545,05610-Feb-201220:15MD5: E8C2109974C72B40EE2402DD312FA9B0
SHA1: FD28493D4AA13846095B25CBCA840C211F742E6E
x64SP2SP2GDR
Wdnsperf.dll5.2.3790.446011,77610-Feb-201220:15MD5: FE7CC7555D1573CBD17DDFB1B7084FE9
SHA1: C3F89ACA67E10327AABEB1B9343EEEAFDB64C9E3
x86SP2SP2GDR\WOW
Wmswsock.dll5.2.3790.4318233,47210-Feb-201220:15MD5: 8CFB662B5EECFABBFBC7F554B55CE82C
SHA1: 493311AC0E943E3A69A28E1EAD66EAA9E3CFA0C9
x86SP2SP2GDR\WOW
Ww03a3409.dll5.2.3790.471544,54410-Feb-201220:15MD5: BF65F758647A0E356ED93B5CE316E657
SHA1: 0EC7C16D19C10475815F40B6C4DD5378B11B095B
x86SP2SP2GDR\WOW
Afd.sys5.2.3790.4949292,35210-Feb-201220:10MD5: E01A5EFA2ADA5F3ACFE877DCA449D34D
SHA1: 97B98444FE1283328362ACA990D0F234775A7748
x64SP2SP2QFE
Dns.exe5.2.3790.4957782,33610-Feb-201220:10MD5: AEAC83CF6419464CB7799B61542EC3C4
SHA1: F9A5E7DED7E87447E48E750009C4853EB151F6EF
x64SP2SP2QFE
Dnsperf.dll5.2.3790.446014,33610-Feb-201220:10MD5: 1D6AB3D2ED7DB4642758C2406E7032A6
SHA1: 986E526D42A6D6FB54117D43AD124C2329F5ADB6
x64SP2SP2QFE
Dnsperf.hNot Applicable6,64210-Feb-201220:10Not ApplicableNot ApplicableSP2SP2QFE
Dnsperf.iniNot Applicable11,59710-Feb-201220:10Not ApplicableNot ApplicableSP2SP2QFE
Mswsock.dll5.2.3790.4318493,05610-Feb-201220:10MD5: E3978EF56F355B258DE579477D253C88
SHA1: F74D927AC447C140A08102DD10C196F44C582198
x64SP2SP2QFE
Tcpip.sys5.2.3790.4573798,20810-Feb-201220:10MD5: 1FA5687AF73447576A8A4F1EBD932B92
SHA1: 343589A99E949F660809C94DB29C664A80C453C5
x64SP2SP2QFE
Tcpip6.sys5.2.3790.4662396,03210-Feb-201220:10MD5: 56E8B54E82FA4DBD6565AE3254D8F0C8
SHA1: 9F80EEBC70AAA6326DFCFC22F8E0EE69664231D2
x64SP2SP2QFE
W03a3409.dll5.2.3790.471545,05610-Feb-201220:10MD5: E8C2109974C72B40EE2402DD312FA9B0
SHA1: FD28493D4AA13846095B25CBCA840C211F742E6E
x64SP2SP2QFE
Wdnsperf.dll5.2.3790.446011,77610-Feb-201220:10MD5: 766A9B6BAB60DD9C40EEDC900F41AEED
SHA1: 754E2781FC65BFB7298D78E2EADE8E98F52C8B29
x86SP2SP2QFE\WOW
Wmswsock.dll5.2.3790.4318234,49610-Feb-201220:10MD5: 39596C2F33818F3AC1154F4D0BF0C06B
SHA1: 5CDCAF86A3C6FC904144459D7A9B6E1077FF7BAA
x86SP2SP2QFE\WOW
Ww03a3409.dll5.2.3790.471544,54410-Feb-201220:10MD5: BF65F758647A0E356ED93B5CE316E657
SHA1: 0EC7C16D19C10475815F40B6C4DD5378B11B095B
x86SP2SP2QFE\WOW

For all supported x86-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimeHashesPlatformSP requirementService branch
Afd.sys5.2.3790.4949150,52827-Dec-201114:13MD5: 317E75D96065AC6AF5EF8857CE2E399B
SHA1: AF1521D181ADBBB398E1482FE75C6F56E2CF1245
x86SP2SP2GDR
Dns.exe5.2.3790.4957450,56030-Jan-201212:39MD5: A2023CCDF44AFDB476AD310A42444DEC
SHA1: 350A6878451BAEDDFFD31CEBCD9EE7F385D343BF
x86SP2SP2GDR
Dnsperf.dll5.2.3790.446011,77617-Feb-200908:26MD5: FE7CC7555D1573CBD17DDFB1B7084FE9
SHA1: C3F89ACA67E10327AABEB1B9343EEEAFDB64C9E3
x86SP2SP2GDR
Dnsperf.hNot Applicable6,64207-Jul-201018:42Not ApplicableNot ApplicableSP2SP2GDR
Dnsperf.iniNot Applicable11,59707-Jul-201018:42Not ApplicableNot ApplicableSP2SP2GDR
Mswsock.dll5.2.3790.4318256,00020-Jun-200818:32MD5: 9C0BF64484E9D297CB3E96DC22765A82
SHA1: 123AEB783FE74088BF8A5B3FA72E7A6AD054D73F
x86SP2SP2GDR
Tcpip.sys5.2.3790.4573393,21615-Aug-200909:57MD5: 238DC2B879D1B37B91F8D5D44F3815D3
SHA1: A4ED2B54B9EA2456EFAEFC0AD564BC28E3BEE8B1
x86SP2SP2GDR
Tcpip6.sys5.2.3790.4662247,36010-Feb-201012:48Not ApplicableNot ApplicableSP2SP2GDR
W03a3409.dll5.2.3790.471544,54409-Jul-201004:25MD5: BF65F758647A0E356ED93B5CE316E657
SHA1: 0EC7C16D19C10475815F40B6C4DD5378B11B095B
x86SP2SP2GDR
Afd.sys5.2.3790.4949150,52827-Dec-201114:27MD5: 1352E45B12732172655C445A57E20991
SHA1: 842BFF2F6464B5D18198B372C19F8FB6C045D74B
x86SP2SP2QFE
Dns.exe5.2.3790.4957451,58430-Jan-201212:39MD5: 2A1614828BE1E1558D06D3B2D6BEAF9B
SHA1: 2BA440EC64C85765AEF74E0A08792653C75990DE
x86SP2SP2QFE
Dnsperf.dll5.2.3790.446011,77617-Feb-200908:12MD5: 766A9B6BAB60DD9C40EEDC900F41AEED
SHA1: 754E2781FC65BFB7298D78E2EADE8E98F52C8B29
x86SP2SP2QFE
Dnsperf.hNot Applicable6,64207-Jul-201018:42Not ApplicableNot ApplicableSP2SP2QFE
Dnsperf.iniNot Applicable11,59707-Jul-201018:42Not ApplicableNot ApplicableSP2SP2QFE
Mswsock.dll5.2.3790.4318257,02420-Jun-200819:01MD5: 2FCC6D31B7CED67E659B7C629CEC89D4
SHA1: F1A304F0C3879C1DC070D0316E6DC47DDAC8D9AD
x86SP2SP2QFE
Tcpip.sys5.2.3790.4573400,89615-Aug-200908:27MD5: 2617E35A208F1570D6928C13E63019FF
SHA1: FECA0DAD34273FB61E21FB0473977BD1CB5264CF
x86SP2SP2QFE
Tcpip6.sys5.2.3790.4662248,64010-Feb-201015:51Not ApplicableNot ApplicableSP2SP2QFE
W03a3409.dll5.2.3790.471544,54409-Jul-201004:25MD5: BF65F758647A0E356ED93B5CE316E657
SHA1: 0EC7C16D19C10475815F40B6C4DD5378B11B095B
x86SP2SP2QFE

For all supported IA-64-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimeHashesPlatformSP requirementService branch
Afd.sys5.2.3790.4949584,19210-Feb-201220:13MD5: 158E1519BF9D46AE74163609EE542946
SHA1: 7D658C4005F60C5B51CF454ACB4AAAE71A14C8F4
IA-64SP2SP2GDR
Dns.exe5.2.3790.49571,147,90410-Feb-201220:13MD5: 618F313EF216D7545B2174AEBEA41089
SHA1: 0508EB70A2B7F99F7D627AD1E5A32F0D3B903223
IA-64SP2SP2GDR
Dnsperf.dll5.2.3790.446026,62410-Feb-201220:13MD5: C703A18E1DE106387EAF04C79FA8ECBC
SHA1: 6C75FA6F962296536C7A1F25376C17BD53388DAF
IA-64SP2SP2GDR
Dnsperf.hNot Applicable6,64210-Feb-201220:13Not ApplicableNot ApplicableSP2SP2GDR
Dnsperf.iniNot Applicable11,59710-Feb-201220:13Not ApplicableNot ApplicableSP2SP2GDR
Mswsock.dll5.2.3790.4318785,40810-Feb-201220:13MD5: 2D2663ECA310A3C5FF762643B9A1BD21
SHA1: 47A2F0DBD43CAC24ED68803E1FCE3F41330C3D61
IA-64SP2SP2GDR
Tcpip.sys5.2.3790.45731,313,28010-Feb-201220:13MD5: F17E7A33B3BE16B83D1FED0620F771B9
SHA1: A2431105DAD5BA752D1E6135765BDB217D18BC57
IA-64SP2SP2GDR
Tcpip6.sys5.2.3790.4662798,97610-Feb-201220:13Not ApplicableNot ApplicableSP2SP2GDR
W03a3409.dll5.2.3790.471543,52010-Feb-201220:13MD5: 9D115CCF9F48E7E82DDA9EB9C5E7C51C
SHA1: AFFBCBEF7EE61A4E542C39D65DA0407625C129DA
IA-64SP2SP2GDR
Wdnsperf.dll5.2.3790.446011,77610-Feb-201220:13MD5: FE7CC7555D1573CBD17DDFB1B7084FE9
SHA1: C3F89ACA67E10327AABEB1B9343EEEAFDB64C9E3
x86SP2SP2GDR\WOW
Wmswsock.dll5.2.3790.4318233,47210-Feb-201220:13MD5: 8CFB662B5EECFABBFBC7F554B55CE82C
SHA1: 493311AC0E943E3A69A28E1EAD66EAA9E3CFA0C9
x86SP2SP2GDR\WOW
Ww03a3409.dll5.2.3790.471544,54410-Feb-201220:13MD5: BF65F758647A0E356ED93B5CE316E657
SHA1: 0EC7C16D19C10475815F40B6C4DD5378B11B095B
x86SP2SP2GDR\WOW
Afd.sys5.2.3790.4949584,19210-Feb-201220:10MD5: DD7E66790C721D39010698636CB2CAD3
SHA1: 0CCDB5C578E9D2A0EC9427128F1AD831866FD98E
IA-64SP2SP2QFE
Dns.exe5.2.3790.49571,152,51210-Feb-201220:10MD5: 9914DC97A4358A861A0B19A85C61B0FB
SHA1: 02CFF0E4EC0A5F14A13E6CD4D1968E8F1256FE93
IA-64SP2SP2QFE
Dnsperf.dll5.2.3790.446026,62410-Feb-201220:10MD5: FE872DEA4A532540FB6F68465E196F1F
SHA1: DE9C79342E2BFD5517419E81A024AE6340420392
IA-64SP2SP2QFE
Dnsperf.hNot Applicable6,64210-Feb-201220:10Not ApplicableNot ApplicableSP2SP2QFE
Dnsperf.iniNot Applicable11,59710-Feb-201220:10Not ApplicableNot ApplicableSP2SP2QFE
Mswsock.dll5.2.3790.4318789,50410-Feb-201220:10MD5: F810367C167505F0AE0009155E330A8E
SHA1: E8DB0D4D8A3548932BBC3F49456476DE3683B635
IA-64SP2SP2QFE
Tcpip.sys5.2.3790.45731,336,32010-Feb-201220:10MD5: EB2560367D0027D53CCA314AA202FC47
SHA1: 2562786897D6CEB56D7BD863557C2587863FE0C8
IA-64SP2SP2QFE
Tcpip6.sys5.2.3790.4662802,68810-Feb-201220:10Not ApplicableNot ApplicableSP2SP2QFE
W03a3409.dll5.2.3790.471543,52010-Feb-201220:10MD5: 9D115CCF9F48E7E82DDA9EB9C5E7C51C
SHA1: AFFBCBEF7EE61A4E542C39D65DA0407625C129DA
IA-64SP2SP2QFE
Wdnsperf.dll5.2.3790.446011,77610-Feb-201220:10MD5: 766A9B6BAB60DD9C40EEDC900F41AEED
SHA1: 754E2781FC65BFB7298D78E2EADE8E98F52C8B29
x86SP2SP2QFE\WOW
Wmswsock.dll5.2.3790.4318234,49610-Feb-201220:10MD5: 39596C2F33818F3AC1154F4D0BF0C06B
SHA1: 5CDCAF86A3C6FC904144459D7A9B6E1077FF7BAA
x86SP2SP2QFE\WOW
Ww03a3409.dll5.2.3790.471544,54410-Feb-201220:10MD5: BF65F758647A0E356ED93B5CE316E657
SHA1: 0EC7C16D19C10475815F40B6C4DD5378B11B095B
x86SP2SP2QFE\WOW

Windows Server 2008 file information

  • The files that apply to a specific product, milestone (SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.0.6002.18xxxWindows Vista SP2 and Windows Server 2008 SP2SP2GDR
    6.0.6002.22xxxWindows Vista SP2 and Windows Server 2008 SP2SP2LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and the MUM files (.mum) that are installed for each environment are listed separately. MUM and MANIFEST files, and the associated security catalog (.cat) files, are critical to maintaining the state of the updated component. The security catalog files (attributes not listed) are signed with a Microsoft digital signature.

For all supported x86-based versions of Windows Server 2008

File nameFile versionFile sizeDateTimeHashesPlatform
Cache.dnsNot Applicable3,17916-Apr-200800:31Not ApplicableNot Applicable
Dns.exe6.0.6002.18557510,97623-Dec-201113:41MD5: 8319D91CFE1157CAE9831AA74A7CA43F
SHA1: 8FDB59398F23D25CD37D89148CC4E409B0AE449C
x86
Dnsserver.events.xmlNot Applicable60916-Apr-200800:31Not ApplicableNot Applicable
Cache.dnsNot Applicable3,17909-Sep-201111:25Not ApplicableNot Applicable
Dns.exe6.0.6002.22763511,48826-Dec-201115:33MD5: 3A9821172FCB425A9BF17327EAC69CF1
SHA1: A7FCA712175903DEB8DDBAA0EF048357664BE594
x86
Dnsserver.events.xmlNot Applicable60909-Sep-201111:25Not ApplicableNot Applicable

For all supported x64-based versions of Windows Server 2008

File nameFile versionFile sizeDateTimeHashesPlatform
Cache.dnsNot Applicable3,17903-Sep-200818:33Not ApplicableNot Applicable
Dns.exe6.0.6002.18557639,48823-Dec-201114:03MD5: E79BD15D16ABBE5CE575B5ACC5B0B979
SHA1: 171822DC92907D8DE0302DA31AF06E77D8537B71
x64
Dnsserver.events.xmlNot Applicable60903-Sep-200818:33Not ApplicableNot Applicable
Cache.dnsNot Applicable3,17915-Nov-201115:04Not ApplicableNot Applicable
Dns.exe6.0.6002.22763639,48826-Dec-201114:36MD5: 0B78950171728CA83B0E6C048B994792
SHA1: 0F2F7519043E2274985A325C32FB29B6FFB59429
x64
Dnsserver.events.xmlNot Applicable60915-Nov-201115:04Not ApplicableNot Applicable

Additional file information for Windows Server 2008

Additional files for all supported x86-based versions of Windows Server 2008

File namePackage_1_for_kb2647170_bf~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size2,069
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_1_for_kb2647170~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size2,790
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_2_for_kb2647170_bf~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size2,069
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_2_for_kb2647170~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size2,790
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sc_1_bf~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size1,519
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sc_1~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size1,542
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sc_bf~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size1,418
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sc~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size1,437
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_server_1_bf~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size1,523
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_server_1~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size1,546
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_server_bf~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size1,426
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_server~31bf3856ad364e35~x86~~6.0.1.0.mum
File versionNot Applicable
File size1,445
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameUpdate-bf.mum
File versionNot Applicable
File size2,192
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameX86_612da3469bca4913862d3fa1c1346a20_31bf3856ad364e35_6.0.6002.22763_none_67e944b575237e27.manifest
File versionNot Applicable
File size706
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameX86_70dad00520638f5f4cc9bdae1ce9cb18_31bf3856ad364e35_6.0.6002.18557_none_b0dd66634205941d.manifest
File versionNot Applicable
File size706
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameX86_microsoft-windows-dns-server-service_31bf3856ad364e35_6.0.6002.18557_none_4fbd58f7d3dd147d.manifest
File versionNot Applicable
File size163,376
Date (UTC)23-Dec-2011
Time (UTC)16:18
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameX86_microsoft-windows-dns-server-service_31bf3856ad364e35_6.0.6002.22763_none_50382694ed066803.manifest
File versionNot Applicable
File size163,376
Date (UTC)26-Dec-2011
Time (UTC)17:50
SHA-1 hashNot Applicable
MD5 hashNot Applicable

Additional files for all supported x64-based versions of Windows Server 2008

File nameAmd64_aa83d15ae1c29eeaa605478385849b72_31bf3856ad364e35_6.0.6002.18557_none_ec1f85f3b610aa65.manifest
File versionNot Applicable
File size710
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_fb2930fabf35143695111953225a1444_31bf3856ad364e35_6.0.6002.22763_none_7d7b24661726689f.manifest
File versionNot Applicable
File size710
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_microsoft-windows-dns-server-service_31bf3856ad364e35_6.0.6002.18557_none_abdbf47b8c3a85b3.manifest
File versionNot Applicable
File size163,418
Date (UTC)23-Dec-2011
Time (UTC)16:34
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_microsoft-windows-dns-server-service_31bf3856ad364e35_6.0.6002.22763_none_ac56c218a563d939.manifest
File versionNot Applicable
File size163,418
Date (UTC)26-Dec-2011
Time (UTC)20:02
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_1_for_kb2647170_bf~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size2,083
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_1_for_kb2647170~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size2,808
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_2_for_kb2647170_bf~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size2,083
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_2_for_kb2647170~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size2,808
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sc_1_bf~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size1,529
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sc_1~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size1,552
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sc_bf~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size1,426
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sc~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size1,445
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_server_1_bf~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size1,533
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_server_1~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size1,556
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_server_bf~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size1,434
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_server~31bf3856ad364e35~amd64~~6.0.1.0.mum
File versionNot Applicable
File size1,453
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameUpdate-bf.mum
File versionNot Applicable
File size2,208
Date (UTC)27-Dec-2011
Time (UTC)12:52
SHA-1 hashNot Applicable
MD5 hashNot Applicable

Windows Server 2008 R2 file information

  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.1.7600.16xxxWindows Server 2008 R2RTMGDR
    6.1.7600.20xxxWindows Server 2008 R2RTMLDR
    6.1.7601.17xxxWindows Server 2008 R2SP1GDR
    6.1.7601.21xxxWindows Server 2008 R2SP1LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and the MUM files (.mum) that are installed for each environment are listed separately in the "Additional file information for Windows Server 2008 R2" section. MUM and MANIFEST files, and the associated security catalog (.cat) files, are critical to maintaining the state of the updated component. The security catalog files, for which the attributes are not listed, are signed with a Microsoft digital signature.

For all supported x64-based versions of Windows Server 2008 R2

File nameFile versionFile sizeDateTimeHashesPlatform
Cache.dnsNot Applicable3,19810-Jun-200920:31Not ApplicableNot Applicable
Dns.exe6.1.7600.16936696,32027-Dec-201102:12MD5: 0B678FF3EA556F50408E6AEA0D7D4FB1
SHA1: C75A11430EE05CB9022AF0801CC44D54904EB7FA
x64
Dnsserver.events.xmlNot Applicable60910-Jun-200920:31Not ApplicableNot Applicable
Cache.dnsNot Applicable3,19810-Jun-200920:31Not ApplicableNot Applicable
Dns.exe6.1.7600.21114697,85627-Dec-201102:26MD5: 7427B8AE06D3CCA3855F0A4C7D4F6F29
SHA1: 897FF3FFCAF5725BC5BA600A66EEA212CD40D611
x64
Dnsserver.events.xmlNot Applicable60910-Jun-200920:31Not ApplicableNot Applicable
Cache.dnsNot Applicable3,19805-Nov-201001:52Not ApplicableNot Applicable
Dns.exe6.1.7601.17750696,83226-Dec-201106:45MD5: AAAF242737F26627774A4CD55CD85FCE
SHA1: 929EB11CFA2294ABAE1EA219576569DA19F638ED
x64
Dnsserver.events.xmlNot Applicable60905-Nov-201001:52Not ApplicableNot Applicable
Cache.dnsNot Applicable3,19805-Nov-201001:52Not ApplicableNot Applicable
Dns.exe6.1.7601.21885698,36827-Dec-201102:00MD5: 715AC4616955EB08B8647B3A3676398F
SHA1: B02ED9F9B656EC5B4E381B5549B3C00EBEE85B43
x64
Dnsserver.events.xmlNot Applicable60905-Nov-201001:52Not ApplicableNot Applicable

Additional file information for Windows Server 2008 R2

Additional files for all supported x64-based versions of Windows Server 2008 R2

File nameAmd64_0418a9e851f2e8355558119424223cde_31bf3856ad364e35_6.1.7601.21885_none_0c6904fa38783dfe.manifest
File versionNot Applicable
File size710
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_1ff69a9d0b7604b47b79d6cce2553c11_31bf3856ad364e35_6.1.7600.16936_none_a8f688d7cc7d7db1.manifest
File versionNot Applicable
File size710
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_22d8117e0675b08ba77d9276fc5befea_31bf3856ad364e35_6.1.7601.17750_none_2fbd693859aa2518.manifest
File versionNot Applicable
File size710
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_6902a3cc40fca6f5f3704a43de83d553_31bf3856ad364e35_6.1.7600.21114_none_045293e7e2801ca3.manifest
File versionNot Applicable
File size710
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_microsoft-windows-dns-server-service_31bf3856ad364e35_6.1.7600.16936_none_aa31f266f01c1c3e.manifest
File versionNot Applicable
File size158,131
Date (UTC)27-Dec-2011
Time (UTC)02:38
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_microsoft-windows-dns-server-service_31bf3856ad364e35_6.1.7600.21114_none_aacf0698092b84ba.manifest
File versionNot Applicable
File size158,131
Date (UTC)27-Dec-2011
Time (UTC)02:58
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_microsoft-windows-dns-server-service_31bf3856ad364e35_6.1.7601.17750_none_abfcadd8ed582802.manifest
File versionNot Applicable
File size158,131
Date (UTC)26-Dec-2011
Time (UTC)07:18
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameAmd64_microsoft-windows-dns-server-service_31bf3856ad364e35_6.1.7601.21885_none_ac6adc5206899a52.manifest
File versionNot Applicable
File size158,131
Date (UTC)27-Dec-2011
Time (UTC)02:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_1_for_kb2647170_bf~31bf3856ad364e35~amd64~~6.1.1.0.mum
File versionNot Applicable
File size2,005
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_1_for_kb2647170~31bf3856ad364e35~amd64~~6.1.1.0.mum
File versionNot Applicable
File size3,146
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_2_for_kb2647170_bf~31bf3856ad364e35~amd64~~6.1.1.0.mum
File versionNot Applicable
File size2,417
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_2_for_kb2647170~31bf3856ad364e35~amd64~~6.1.1.0.mum
File versionNot Applicable
File size2,726
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_rtm_bf~31bf3856ad364e35~amd64~~6.1.1.0.mum
File versionNot Applicable
File size1,656
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_rtm~31bf3856ad364e35~amd64~~6.1.1.0.mum
File versionNot Applicable
File size1,679
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sp1_bf~31bf3856ad364e35~amd64~~6.1.1.0.mum
File versionNot Applicable
File size1,656
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File namePackage_for_kb2647170_sp1~31bf3856ad364e35~amd64~~6.1.1.0.mum
File versionNot Applicable
File size1,679
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable
File nameUpdate-bf.mum
File versionNot Applicable
File size2,334
Date (UTC)27-Dec-2011
Time (UTC)12:25
SHA-1 hashNot Applicable
MD5 hashNot Applicable

↑ Back to the top


Keywords: kbsurveynew, kbsecreview, kbsecvulnerability, kbsecurity, kbsecbulletin, atdownload, kblangall, kbfix, kbexpertiseinter, kbbug, kb, kbmustloc

↑ Back to the top

Article Info
Article ID : 2647170
Revision : 1
Created on : 1/7/2017
Published on : 4/24/2012
Exists online : False
Views : 402