Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS15-037: Vulnerability in Windows Task Scheduler could allow elevation of privilege: April 14, 2015


View products that this article applies to.

Summary

This security update resolves a vulnerability in Microsoft Windows. An attacker who successfully exploited the vulnerability could take advantage of a known invalid task to cause Task Scheduler to run a specially crafted application in the context of the System account. An attacker could then do the following: 
  • Install programs
  • View, change, or delete data
  • Create new accounts that have full user rights 

↑ Back to the top


Introduction

Microsoft has released security bulletin MS15-037. To learn more about this security bulletin:

How to obtain help and support for this security update

Help installing updates:
Support for Microsoft Update

Security solutions for IT professionals:
TechNet Security Troubleshooting and Support

Help protect your Windows-based computer from viruses and malware:
Virus Solution and Security Center

Local support according to your country:
International Support

↑ Back to the top


More Information

Security update deployment information

Windows 7 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported 32-bit editions of Windows 7:
Windows6.1-KB3046269-x86.msu

For all supported x64-based editions of Windows 7:
Windows6.1-KB3046269-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementThis update does not require a restart.
Removal informationTo uninstall an update that is installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, and under Windows Update, click View installed updates, and then select from the list of updates.
File informationSee Microsoft Knowledge Base Article 3046269
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows Server 2008 R2 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported x64-based editions of Windows Server 2008 R2:
Windows6.1-KB3046269-x64.msu

For all supported Itanium-based editions of Windows Server 2008 R2:
Windows6.1-KB3046269-ia64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementThis update does not require a restart.
Removal informationTo uninstall an update that is installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, and under Windows Update, click View installed updates, and then select from the list of updates.
File informationSee Microsoft Knowledge Base Article 3046269
Registry key verificationNote A registry key does not exist to validate the presence of this update.

File hash information
File nameSHA1 hashSHA256 hash
Windows6.1-KB3046269-ia64.msuAC68FED41565097A414BACAE196E4A29B2912E0F8D0C0F6E45B8AAC7BE06327030201BBE6E2334CE7A346F845A491F9E77B1B25A
Windows6.1-KB3046269-x64.msu9CDABEB9C2A859414C27C4F981D6B1334AEE0AD527C6571F92D7B220E0B3A7BDBBDF05B7762AF58468E77E2AA7F1F5D9278C367B
Windows6.1-KB3046269-x86.msuDAD279443DC5E3446BB2B478252C90D5F115FAF15119EAF82A23ABE8A834C656F5D1AC9368F7642FF12A254E96FBC62A75144A05

↑ Back to the top


Keywords: atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew, kb

↑ Back to the top

Article Info
Article ID : 3046269
Revision : 1
Created on : 1/7/2017
Published on : 4/14/2015
Exists online : False
Views : 173