Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Security update for the Scripting Engine Memory Corruption Vulnerability in Windows Server 2008: May 9, 2017


View products that this article applies to.

Summary

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory when the engine is rendered in Internet Explorer. 
In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability through Internet Explorer, and then convince a user to view the website. An attacker could also embed an ActiveX control that is marked "safe for initialization" in an application or Microsoft Office document that hosts the Internet Explorer rendering engine.
The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could be used to exploit this vulnerability.

To learn more about the vulnerability, go to CVE-2017-0158.

↑ Back to the top


More Information

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Get security updates automatically.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

↑ Back to the top


Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File Information

File hash information
File nameSHA1 hashSHA256 hash
Windows6.0-KB4020535-ia64.msuAFC67EB5B999CEA6DB864E96AAF500B37052DC6DD261C0ECD7F1BF65E80CAE652C3B90045A2EEBEF84940B05FCFD44D7B536B855
Windows6.0-KB4020535-x64.msu496634612B501E502835FEECF16C825566AD1A505A1936AA781A1E6653D2E8B444B7AE79E9BCD48E828318B8139AF7EEBB308EA4
Windows6.0-KB4020535-x86.msuC709FF70E54A4EF5D1CA248D54B676DD9CACA05F3DBD6EC4E507098D7BFB43AC8FE90BD2565B9597CFE8DD4130ABF132B7E9FFE3

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2008 file information
For all supported ia64-based versions
File nameFile versionFile sizeDateTimePlatform
Cdosys.dll6.6.6002.240922,118,14421-Apr-201715:17IA-64
Msado60.tlb6.0.6002.2409273,72821-Apr-201714:47Not applicable
Msado15.dll6.0.6002.197741,798,14421-Apr-201715:46IA-64
Msado15.dll6.0.6002.240921,904,64021-Apr-201715:18IA-64
Cdosys.dll6.6.6002.24092805,88821-Apr-201715:23x86
Msado60.tlb6.0.6002.2409273,72821-Apr-201714:42Not applicable
Msado15.dll6.0.6002.19774708,60821-Apr-201715:55x86
Msado15.dll6.0.6002.24092737,28021-Apr-201715:24x86
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatform
Cdosys.dll6.6.6002.240921,151,48821-Apr-201715:43x64
Msado60.tlb6.0.6002.2409273,72821-Apr-201715:07Not applicable
Msado15.dll6.0.6002.19774974,84821-Apr-201716:20x64
Msado15.dll6.0.6002.240921,036,28821-Apr-201715:44x64
Cdosys.dll6.6.6002.24092805,88821-Apr-201715:23x86
Msado60.tlb6.0.6002.2409273,72821-Apr-201714:42Not applicable
Msado15.dll6.0.6002.19774708,60821-Apr-201715:55x86
Msado15.dll6.0.6002.24092737,28021-Apr-201715:24x86
For all supported x86-based versions
File nameFile versionFile sizeDateTimePlatform
Cdosys.dll6.6.6002.24092805,88821-Apr-201715:23x86
Msado60.tlb6.0.6002.2409273,72821-Apr-201714:42Not applicable
Msado15.dll6.0.6002.19774708,60821-Apr-201715:55x86
Msado15.dll6.0.6002.24092737,28021-Apr-201715:24x86

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 4020535
Revision : 11
Created on : 8/11/2017
Published on : 8/11/2017
Exists online : False
Views : 232