Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

LNK remote code execution vulnerability: June 13, 2017


View products that this article applies to.

Summary

A remote code execution exists in Microsoft Windows that could allow remote code execution if the icon of a specially crafted shortcut is displayed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

To learn more about the vulnerability, see CVE-2017-8464.

↑ Back to the top


More Information

Important
 
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

↑ Back to the top


Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File Information

File hash information
File name SHA1 hash SHA256 hash
Windows6.0-KB4021903-x86.msu E242C183D5161A316B402855F03C57150EF59CF4 012F5FA414B1B6B36855DD20E476FEDD457402C16A4D54E67BC689248D68C8C2
Windows6.0-KB4021903-ia64.msu DCA18000239FA5C77F2F72C5D7E4C4F9D3442152 1892A9631E1D1CCA3676D875A5609A08B4A945C809B277FD2F3804F1B2A28BFA
Windows6.0-KB4021903-x64.msu D945E443391871F55A9D01D3FDD4C6C48370ECEC 13F6CF468A08B8C36523B13D70ECB21D9B5B77CDD681208685F80C57AD348618


File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

Windows Server 2008 file information

 

For all supported x86-based versions
File name File version File size Date Time Platform
Shell32.dll 6.0.6002.19785 11,588,096 11-May-2017 15:55 x86
Shell32.dll 6.0.6002.24102 11,591,168 10-May-2017 19:10 x86
For all supported ia64-based versions
File name File version File size Date Time Platform
Shell32.dll 6.0.6002.19785 19,090,432 11-May-2017 15:42 IA-64
Shell32.dll 6.0.6002.24102 19,098,624 10-May-2017 15:17 IA-64
Shell32.dll 6.0.6002.19785 11,588,096 11-May-2017 15:55 x86
Shell32.dll 6.0.6002.24102 11,591,168 10-May-2017 19:10 x86
For all supported x64-based versions
File name File version File size Date Time Platform
Shell32.dll 6.0.6002.19785 12,901,888 11-May-2017 16:11 x64
Shell32.dll 6.0.6002.24102 12,905,984 10-May-2017 18:03 x64
Shell32.dll 6.0.6002.19785 11,588,096 11-May-2017 15:55 x86
Shell32.dll 6.0.6002.24102 11,591,168 10-May-2017 19:10 x86

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 4021903
Revision : 14
Created on : 7/7/2017
Published on : 7/7/2017
Exists online : False
Views : 258