Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS15-127: Security update for Microsoft Windows DNS to address remote code execution: December 8, 2015


View products that this article applies to.

Summary

This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker sends specially crafted requests to a DNS server.


The security update addresses the vulnerability by modifying how DNS servers parse requests.


To learn more about the vulnerability, see Microsoft Security Bulletin MS15-127.

↑ Back to the top


More Information

Important
  • This security update is only applicable to Windows-based servers that have the DNS server role installed.
  • All future security and nonsecurity updates for Windows Server 2012 R2 require update 2919355 to be installed. We recommend that you install update 2919355 on your Windows Server 2012 R2-based computer so that you receive future updates.
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Known issues

Assume that you have either 3100465 or


3022780 installed on a server that's running Windows Server 2008 R2. If the Domain Name System (DNS) server role is installed on the server, the DNS server may not respond to a CNAME query.

To work around this issue, run the following command from an elevated command prompt to disable the background zone loading feature on the affected DNS server:

dnscmd /Config /DsMinimumBackgroundLoadThreads 0

Note This setting prevents incoming queries from being answered until zone loading is completed. Clients should be configured to use secondary DNS servers as a fallback in this scenario.

To re-enable background zone loading, run the following command from an elevated command prompt:

dnscmd /Config /DsMinimumBackgroundLoadThreads 1

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see
Get security updates automatically.
Method 2: Microsoft Download Center
You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

Click the download link in Microsoft Security Bulletin MS15-127 that corresponds to the version of Windows that you are running.

↑ Back to the top


More Information

Security update deployment information

Windows Server 2008 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file namesFor all supported 32-bit editions of Windows Server 2008:
Windows6.0-KB3100465-x86.msu
For all supported x64-based editions of Windows Server 2008:
Windows6.0-KB3100465-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementA system restart is required after you apply this security update.
Removal informationWUSA.exe does not support uninstall of updates. To uninstall an update that is installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows Server 2008 R2 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported x64-based editions of Windows Server 2008 R2:
Windows6.1-KB3100465-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementA system restart is required after you apply this security update.
Removal informationTo uninstall an update that is installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, and then click System and Security. Under Windows Update, click View installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows Server 2012 and Windows Server 2012 R2 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported editions of Windows Server 2012:
Windows8-RT-KB3100465-x64.msu
For all supported editions of Windows Server 2012 R2:
Windows8.1-KB3100465-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementA system restart is required after you apply this security update.
Removal informationTo uninstall an update that is installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, and then click Windows Update. Under See also, click Installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

How to obtain help and support for this security update
Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support

↑ Back to the top


File Information

File hash information
File nameSHA1 hashSHA256 hash
Windows6.0-KB3100465-x64.msu3DC1A5C0C265534AFCA2C529CEB18B4267105F383A6AF4BF02B36BCEE6AA10E792A0DB3599A0BFFE40C295DADDC8F499017E4470
Windows6.0-KB3100465-x86.msu436A4D50934F5E24CCDF5FC617FDEE2CFC6613362E70CD86692DF013BDAD1503E488ADFBF1BA89463E4291CCF21A5E6713E270B9
Windows6.1-KB3100465-x64.msu95D86E683F56668C7FE512DAAC666559DF8C40FBEFF7E54E6DBCE8ED978C34F41C8524E743DC37A7E6D6B414CE4B6EBB4B81CD81
Windows8-RT-KB3100465-x64.msu0BDC117C3F9C92D3A3287904A949A399BB49215C135ECDF318C8C13C2FD206FD4D5487DE01318DA6791D7686E1525E324F6F65AD
Windows8.1-KB3100465-x64.msuAC03D3A5C93AED0B6DDBC3E19A9EE7379029FB51E0AD28D90D723B9B8434074D55DE5E82FA14A3ABE253C980F31916CA74ABAD48

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). Be aware that dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time bias. The dates and times may also change when you perform certain operations on the files.

Windows Vista and Windows Server 2008 file information

Notes
  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    Version Product Milestone Service branch
    6.0.600 2.19xxxWindows Vista or Windows Server 2008SP2GDR
    6.0.600 2.23xxxWindows Vista or Windows Server 2008SP2LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatform
Cache.dnsNot applicable3,17903-Sep-200818:33Not applicable
Dns.exe6.0.6002.19526640,00020-Oct-201514:39x64
Dnsserver.events.xmlNot applicable60903-Sep-200818:33Not applicable
Cache.dnsNot applicable3,17907-May-201423:40Not applicable
Dns.exe6.0.6002.23836640,51220-Oct-201514:50x64
Dnsserver.events.xmlNot applicable60907-May-201423:40Not applicable
For all supported x86-based versions
File nameFile versionFile sizeDateTimePlatform
Cache.dnsNot applicable3,17916-Apr-200800:31Not applicable
Dns.exe6.0.6002.19526510,97620-Oct-201514:26x86
Dnsserver.events.xmlNot applicable60916-Apr-200800:31Not applicable
Cache.dnsNot applicable3,17907-May-201423:40Not applicable
Dns.exe6.0.6002.23836511,48820-Oct-201514:22x86
Dnsserver.events.xmlNot applicable60907-May-201423:40Not applicable

Windows 7 and Windows Server 2008 R2 file information

Notes
  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    Version Product Milestone Service branch
    6.1.760 1.18xxxWindows 7 or Windows Server 2008 R2 SP1GDR
    6.1.760 1.23 xxxWindows 7 or Windows Server 2008 R2 SP1 LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatform
Cache.dnsNot applicable3,19803-Jun-201520:15Not applicable
Dns.exe6.1.7601.19046696,83220-Oct-201518:40x64
Dnsserver.events.xmlNot applicable60903-Jun-201520:15Not applicable
Cache.dnsNot applicable3,19803-Jun-201520:15Not applicable
Dns.exe6.1.7601.23251700,92820-Oct-201518:17x64
Dnsserver.events.xmlNot applicable60903-Jun-201520:15Not applicable

Windows 8 and Windows Server 2012 file information

Notes
  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    Version Product Milestone Service branch
    6.2.920 0.17xxxWindows 8, Windows RT, or Windows Server 2012RTMGDR
    6.2.920 0.21xxxWindows 8, Windows RT, or Windows Server 2012RTMLDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatform
Cache.dnsNot applicable3,19802-Jun-201214:30Not applicable
Dns.exe6.2.9200.175681,533,95207-Nov-201512:46x64
Dnsserver.events.xmlNot applicable60902-Jun-201214:30Not applicable
Cache.dnsNot applicable3,19802-Jun-201214:30Not applicable
Dns.exe6.2.9200.216851,537,53606-Nov-201520:58x64
Dnsserver.events.xmlNot applicable60902-Jun-201214:30Not applicable

Windows 8.1 and Windows Server 2012 R2 file information

Notes
  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.3.960 0.17 xxxWindows RT 8.1, Windows 8.1, and Windows Server 2012 R2RTMGDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatform
Cache.dnsNot applicable3,19818-Jun-201314:43Not applicable
Dns.exe6.3.9600.180941,735,16820-Oct-201514:25x64
Dnsserver.events.xmlNot applicable60918-Jun-201314:43Not applicable

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 3100465
Revision : 1
Created on : 1/7/2017
Published on : 1/27/2016
Exists online : False
Views : 281