Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Security update for the Windows Explorer remote code execution vulnerability in Windows Server 2008: July 11, 2017


View products that this article applies to.

Summary

A remote code execution vulnerability exists when Windows Explorer improperly handles executable files and shares during rename operations. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another user. Users not running as administrators would be less affected.
To learn more about the vulnerability, go to CVE-2017-8463.

↑ Back to the top


More Information

Important
 
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

↑ Back to the top


Deployment information

For deployment details for this security update, see the following article in the Microsoft Knowledge Base:

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File Information

File hash information
File name SHA1 hash SHA256 hash
Windows6.0-KB4025497-x86.msu C59D87266F5B74E384C200F880DF9819C71C6053 936288D00ED5405EC3F264D7258384F1F473E8B96B3B9E70E6C54D17C12F3862
Windows6.0-KB4025497-ia64.msu B45D5EEFEF6A6A8AB5E7890CA502FD809D147FB1 BC2DEFA1BD6E768880C36737AEB123C6C6B18E76E62A7DFA1C24AFD740B9A71A
Windows6.0-KB4025497-x64.msu 11E97FBC0646E6478F666995F42CE82ADEF13BB4 5F3C36FD50FF745333B4B83BE83A52D14EC12B101BA8192996012019B3A44845


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

Windows Server 2008 file information

For all supported x86-based versions
File name File version File size Date Time Platform
Browseui.dll 6.0.6002.19806 1,324,032 06-Jun-2017 16:06 x86
Browseui.dll 6.0.6002.24126 1,324,032 06-Jun-2017 15:22 x86
For all supported ia64-based versions
File name File version File size Date Time Platform
Browseui.dll 6.0.6002.19806 3,175,936 06-Jun-2017 15:45 IA-64
Browseui.dll 6.0.6002.24126 3,175,936 06-Jun-2017 15:16 IA-64
Browseui.dll 6.0.6002.19806 1,324,032 06-Jun-2017 16:06 x86
Browseui.dll 6.0.6002.24126 1,324,032 06-Jun-2017 15:22 x86
For all supported x64-based versions
File name File version File size Date Time Platform
Browseui.dll 6.0.6002.19806 1,650,176 06-Jun-2017 16:22 x64
Browseui.dll 6.0.6002.24126 1,650,688 06-Jun-2017 15:36 x64
Browseui.dll 6.0.6002.19806 1,324,032 06-Jun-2017 16:06 x86
Browseui.dll 6.0.6002.24126 1,324,032 06-Jun-2017 15:22 x86

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 4025497
Revision : 10
Created on : 7/11/2017
Published on : 7/11/2017
Exists online : False
Views : 192