Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS15-042: Vulnerability in Windows Hyper-V could allow denial of service: April 14, 2015


View products that this article applies to.

Summary

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an authenticated attacker runs a specially crafted application in a virtual machine (VM) session. Notice that the denial of service does not allow an attacker to execute code or elevate user rights on other VMs that are running on the Hyper-V host. However, the issue could cause other VMs on the host not to be manageable in Virtual Machine Manager.

↑ Back to the top


Introduction

Microsoft has released security bulletin MS15-042. To learn more about this security bulletin:

How to obtain help and support for this security update

Help installing updates:
Support for Microsoft Update

Security solutions for IT professionals:
TechNet Security Troubleshooting and Support

Help protect your Windows-based computer from viruses and malware:
Virus Solution and Security Center

Local support according to your country:
International Support

↑ Back to the top


More Information

Known issues in this security update

  • After you install this security update, you may find that old file location cleanup operations are affected when you run a storage migration of Cluster Shared Volume (CSV). To resolve this issue, install vmms.exe version 6.3.9600.17787, included in update 3037313. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
    3037313 Old files are not removed after a migration of virtual machine storage in Windows 8.1 or Windows Server 2012 R2
Security update deployment information

Windows 8.1 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported x64-based editions of Windows 8.1:
Windows8.1-KB3047234-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationTo uninstall an update that is installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, click Windows Update, and under See also, click Installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows Server 2012 R2 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported editions of Windows Server 2012 R2:
Windows8.1-KB3047234-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationTo uninstall an update installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, click Windows Update, and under See also, click Installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

↑ Back to the top


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.
Windows 8.1 and Windows Server 2012 R2 file information

For all supported x64-based versions of Windows 8.1 and Windows Server 2012 R2

File nameFile versionFile sizeDateTimePlatform
Vmms.exe.mui6.3.9600.17039861,18404-Mar-201418:07Not Applicable
Vmms.exe.mui6.3.9600.17039851,96804-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039980,99204-Mar-201417:59Not Applicable
Vmms.exe.mui6.3.9600.17039997,88804-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039784,38404-Mar-201411:29Not Applicable
Vmms.exe.mui6.3.9600.17039937,98404-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039815,10404-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039953,34404-Mar-201418:07Not Applicable
Vmms.exe.mui6.3.9600.17039884,73604-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039921,08804-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039482,30404-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039485,37604-Mar-201418:04Not Applicable
Vmms.exe.mui6.3.9600.17039834,56004-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039894,46404-Mar-201418:03Not Applicable
Vmms.exe.mui6.3.9600.17039922,11204-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039871,42404-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039896,00004-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039865,28004-Mar-201418:03Not Applicable
Vmms.exe.mui6.3.9600.17039855,55204-Mar-201417:58Not Applicable
Vmms.exe.mui6.3.9600.17039794,11204-Mar-201417:58Not Applicable
Vmms.exe.mui6.3.9600.17039344,06404-Mar-201417:59Not Applicable
Vmms.exe.mui6.3.9600.17039360,44804-Mar-201417:59Not Applicable
Vmms.exe.mui6.3.9600.17039360,44804-Mar-201417:59Not Applicable
Rdvgpuinfo.dll6.3.9600.1739661,44008-Oct-201405:58x64
Vmms.exe6.3.9600.1772913,784,06414-Mar-201500:18x64

File hash information
Package NamePackage Hash SHA1Package Hash SHA2
Windows8.1-KB3047234-x64.msuA5F423BBFEFA3E371B7C5F89366D86BC3B58F6C63A9166396B13491207C199A204D58D27230034A2EA8466A3F891A174AE6A0059
Windows8.1-KB3047234-x64.msu25A4C4F35A74FB331416342D757F8D97182345E177CE6D303DAF1EFB7EB2F5F2A7EE186F875FC2CD1F258D5AAEF75C468E89034B

↑ Back to the top


Keywords: kbsurveynew, kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, atdownload, kblangall, kbfix, kbexpertiseinter, kbbug, kb, kbmustloc

↑ Back to the top

Article Info
Article ID : 3047234
Revision : 1
Created on : 1/7/2017
Published on : 10/5/2015
Exists online : False
Views : 251