Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Windows kernel information disclosure vulnerability: June 13, 2017


View products that this article applies to.

Summary

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.

To learn more about the vulnerability, see CVE-2017-8488.

↑ Back to the top


More Information

Important
 
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

↑ Back to the top


Deployment information

For deployment details for this security update, see the following article in the Microsoft Knowledge Base:

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File Information

File hash information
File name SHA1 hash SHA256 hash
Windows6.0-KB4022010-ia64.msu A840C7406BB3E3153721B771DA53EA832FC421E1 09C5BF6B752E1868043DA34DF22B1A4515F05A4677C0ADFD2C8D1123E756B851
Windows6.0-KB4022010-x64.msu C745EA2ABC09BA1D4ECF27FD26FF1E96E3F76F5D BC35C487FAE545C01BB2112C783E585C5D024EB25813A0BDEDB99AECE1AE9F30


File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2008 file information

For all supported ia64-based versions
File name File version File size Date Time Platform
Mountmgr.sys 6.0.6002.19784 167,656 10-May-2017 15:53 IA-64
Msmmsp.dll 6.0.6002.19784 23,552 10-May-2017 15:46 IA-64
Mountmgr.sys 6.0.6002.24102 167,656 10-May-2017 15:22 IA-64
Msmmsp.dll 6.0.6002.24102 23,552 10-May-2017 15:17 IA-64
For all supported x64-based versions
File name File version File size Date Time Platform
Mountmgr.sys 6.0.6002.19784 68,328 10-May-2017 16:12 x64
Msmmsp.dll 6.0.6002.19784 11,264 10-May-2017 16:06 x64
Mountmgr.sys 6.0.6002.24102 68,328 10-May-2017 18:09 x64
Msmmsp.dll 6.0.6002.24102 11,264 10-May-2017 18:03 x64

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 4022010
Revision : 9
Created on : 6/13/2017
Published on : 6/13/2017
Exists online : False
Views : 201