Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS14-006: Vulnerability in IPv6 could allow denial of service: February 11, 2014


View products that this article applies to.

Introduction

Microsoft has released security bulletin MS14-006. To learn more about this security bulletin:

How to obtain help and support for this security update

Help installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help protect your Windows-based computer Windows from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support

↑ Back to the top


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows 8 and Windows Server 2012 file information

  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.2.920 0.16 xxxWindows 8 and Windows Server 2012RTMGDR
    6.2.920 0.20 xxxWindows 8 and Windows Server 2012RTMLDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

For all supported x86-based versions of Windows 8

File nameFile versionFile sizeDateTimePlatform
Fwpkclnt.sys6.2.9200.16548271,08002-Mar-201309:21x86
Tcpip.sys6.2.9200.167541,799,51201-Nov-201304:21x86
Fwpkclnt.sys6.2.9200.16384271,08826-Jul-201203:30x86
Tcpip.sys6.2.9200.208671,814,87201-Nov-201304:02x86

For all supported x64-based versions of Windows 8 and Windows Server 2012

File nameFile versionFile sizeDateTimePlatform
Fwpkclnt.sys6.2.9200.16547411,88002-Mar-201309:59x64
Tcpip.sys6.2.9200.167542,232,66401-Nov-201305:53x64
Fwpkclnt.sys6.2.9200.16384411,88826-Jul-201204:43x64
Tcpip.sys6.2.9200.208672,228,56801-Nov-201306:19x64

File hash information

File nameSHA1 hashSHA256 hash
Windows8-RT-KB2904659-x64.msuF063FE0C996C039D1A9A7887217DCD720A442D4FBB46C20AF0572DBC843D5ABC42F4B5129532CBE32F7385AEDFEA2FF5F5487B7F
Windows8-RT-KB2904659-x86.msu368E225E23665E0B143478EE6B195E5C69547B28004B0B9657C153CE3EEAB1C4602B2212019FCE299FE477680C4AB06F2099D96A

↑ Back to the top


Keywords: kbbug, kbexpertiseinter, kbfix, kbsecbulletin, kbsecurity, kbsecvulnerability, atdownload, KB2904659

↑ Back to the top

Article Info
Article ID : 2904659
Revision : 1
Created on : 2/11/2014
Published on : 2/11/2014
Exists online : False
Views : 353