Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Windows kernel information disclosure vulnerability: June 13, 2017


View products that this article applies to.

Summary

An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.

To learn more about the vulnerability, go to CVE-2017-8483.

↑ Back to the top


More Information

Important
 
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

↑ Back to the top


Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File information

File hash information
File name SHA1 hash SHA256 hash
Windows6.0-KB4022883-x64.msu CA51E3905658274DC222D06096F9F63E9F70BAC2 D05F54C12EF1DDDCD6D347570B83CFAF6B74A95EE125E9CC583CB06113F3175D
Windows6.0-KB4022883-ia64.msu 84FD040E28A28CA2BCA0345DD531598C3B6505CD 59EEE4EC876FDE4A4C4901BB008E306782F2D53ABBF77CD2B456560D3765D1E6


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2008 file information

For all supported x64-based versions
File name File version File size Date Time Platform
Atmfd.dll 5.1.2.252 383,208 14-May-2017 18:51 x64
Atmlib.dll 5.1.2.252 48,128 14-May-2017 18:45 x64
Dciman32.dll 6.0.6002.18051 14,336 15-Jun-2009 15:10 x64
Fontsub.dll 6.0.6002.18272 96,256 16-Jun-2010 16:30 x64
Lpk.dll 6.0.6001.18000 32,768 19-Jan-2008 08:02 x64
Atmfd.dll 5.1.2.252 383,208 14-May-2017 23:00 x64
Atmlib.dll 5.1.2.252 48,128 14-May-2017 19:41 x64
Dciman32.dll 6.0.6002.24105 14,336 14-May-2017 19:41 x64
Fontsub.dll 6.0.6002.24105 96,256 14-May-2017 19:41 x64
Lpk.dll 6.0.6002.24105 32,768 14-May-2017 19:42 x64
Atmfd.dll 5.1.2.252 306,408 14-May-2017 18:33 x86
Atmlib.dll 5.1.2.252 34,304 14-May-2017 18:26 x86
Dciman32.dll 6.0.6002.18051 10,240 15-Jun-2009 14:51 x86
Fontsub.dll 6.0.6002.18272 72,704 16-Jun-2010 15:30 x86
Lpk.dll 6.0.6002.18005 23,552 11-Apr-2009 06:26 x86
Atmfd.dll 5.1.2.252 306,408 14-May-2017 19:31 x86
Atmlib.dll 5.1.2.252 34,304 14-May-2017 19:23 x86
Dciman32.dll 6.0.6002.24105 10,240 14-May-2017 19:23 x86
Fontsub.dll 6.0.6002.24105 72,704 14-May-2017 19:23 x86
Lpk.dll 6.0.6002.24105 23,552 14-May-2017 19:25 x86
For all supported ia64-based versions
File name File version File size Date Time Platform
Atmfd.dll 5.1.2.252 793,320 14-May-2017 18:22 IA-64
Atmlib.dll 5.1.2.252 92,160 14-May-2017 18:15 IA-64
Dciman32.dll 6.0.6001.18000 29,184 19-Jan-2008 08:26 IA-64
Fontsub.dll 6.0.6002.18124 196,096 19-Oct-2009 13:31 IA-64
Lpk.dll 6.0.6001.18000 68,608 19-Jan-2008 08:28 IA-64
Atmfd.dll 5.1.2.252 793,320 14-May-2017 17:41 IA-64
Atmlib.dll 5.1.2.252 92,160 14-May-2017 17:35 IA-64
Dciman32.dll 6.0.6002.24105 29,184 14-May-2017 17:35 IA-64
Fontsub.dll 6.0.6002.24105 196,096 14-May-2017 17:35 IA-64
Lpk.dll 6.0.6002.24105 68,608 14-May-2017 17:35 IA-64
Atmfd.dll 5.1.2.252 306,408 14-May-2017 18:33 x86
Atmlib.dll 5.1.2.252 34,304 14-May-2017 18:26 x86
Dciman32.dll 6.0.6002.18051 10,240 15-Jun-2009 14:51 x86
Fontsub.dll 6.0.6002.18272 72,704 16-Jun-2010 15:30 x86
Lpk.dll 6.0.6002.18005 23,552 11-Apr-2009 06:26 x86
Atmfd.dll 5.1.2.252 306,408 14-May-2017 19:31 x86
Atmlib.dll 5.1.2.252 34,304 14-May-2017 19:23 x86
Dciman32.dll 6.0.6002.24105 10,240 14-May-2017 19:23 x86
Fontsub.dll 6.0.6002.24105 72,704 14-May-2017 19:23 x86
Lpk.dll 6.0.6002.24105 23,552 14-May-2017 19:25 x86

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 4022883
Revision : 10
Created on : 6/13/2017
Published on : 6/13/2017
Exists online : False
Views : 592