Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS17-008: Description of the security update for Hyper-V: March 14, 2017


View products that this article applies to.

Summary

This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an authenticated attacker on a guest operating system runs a specially crafted application that causes the Hyper-V host operating system to execute arbitrary code. Customers who have not enabled the Hyper-V role are not affected.
To learn more about the vulnerability, see Microsoft Security Bulletin MS17-008.

↑ Back to the top


More Information

Important
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


How to obtain and install the update



Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Get security updates automatically.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File Information

File hash information



File nameSHA1 hashSHA256 hash
Windows6.0-KB3211306-x64.msu6C5F30D6C1C17C60AF4B37E28CA3B69E31875D440EAD007F90A72240D7445FA1B98CF36000181AD899D000838435B613CFA824A4


File information



The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Vista and Windows Server 2008 file information



Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

For all supported x64-based versions



File nameFile versionFile sizeDateTimePlatform
Hvax64.exe6.0.6002.18688651,26431-Aug-201213:52x64
Hvboot.sys6.0.6002.18688108,41631-Aug-201222:01x64
Hvix64.exe6.0.6002.18688672,25631-Aug-201213:52x64
Virtualization.events.xmlNot applicable1,38403-Apr-200921:20Not applicable
Hvax64.exe6.0.6002.24070634,36804-Mar-201702:36x64
Hvboot.sys6.0.6002.24070108,26404-Mar-201703:38x64
Hvix64.exe6.0.6002.24070642,04804-Mar-201702:36x64
Virtualization.events.xmlNot applicable1,38407-Mar-201623:38Not applicable
Vmsntfy.dll6.0.6002.1832762,46414-Oct-201016:11x64
Vmswitch.sys6.0.6002.19747247,29604-Mar-201702:28x64
Vmsntfy.dll6.0.6002.2407063,48804-Mar-201702:40x64
Vmswitch.sys6.0.6002.24070247,29604-Mar-201702:40x64

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 3211306
Revision : 9
Created on : 3/10/2017
Published on : 3/14/2017
Exists online : False
Views : 234