Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update for the Windows shell remote code execution vulnerability in Windows Server 2008: March 13, 2018


View products that this article applies to.

Summary

A remote code execution vulnerability exists when Windows Shell does not properly validate file copy destinations.

To learn more about the vulnerability, go to CVE-2018-0883.

↑ Back to the top


More Information

Important If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

↑ Back to the top


Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


Windows Server 2008 file information

File hash information
File name SHA1 hash SHA256 hash
Windows6.0-KB4089175-x86.msu DC4BB74370DB31F31C2D4CC5464F31692CAA6383 4886901B0F705F6C0A33AFAC3F3714A000F3F3B1A9EECA403C81B770F9AC0D13
Windows6.0-KB4089175-ia64.msu 8BBE180F5EAE2DC29FEE15F148147DB4123AB97B DB23746CC0828721E7660D297F3E491D4719B7EB1E3D7DC8610B29BDA76800BC
Windows6.0-KB4089175-x64.msu 8B5EC4B1148C5D618F5003D9055C7A805605533A 427A517DFCD42576ED84C7040BFEFD360BC79DFA9FEE097C3AE0E31E5A24AF76

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

For all supported x86-based versions
File name File version File size Date Time Platform
Compressed (zipped) folder.zfsendtotarget Not applicable 3 16-Nov-2017 03:47 Not applicable
Zipfldr.dll 6.0.6002.24305 342,528 10-Feb-2018 07:09 x86
For all supported ia64-based versions
File name File version File size Date Time Platform
Compressed (zipped) folder.zfsendtotarget Not applicable 3 16-Nov-2017 03:20 Not applicable
Zipfldr.dll 6.0.6002.24305 747,008 10-Feb-2018 06:47 IA-64
Zipfldr.dll 6.0.6002.24305 342,528 10-Feb-2018 07:09 x86
For all supported x64-based versions
File name File version File size Date Time Platform
Compressed (zipped) folder.zfsendtotarget Not applicable 3 16-Nov-2017 03:47 Not applicable
Zipfldr.dll 6.0.6002.24305 387,072 10-Feb-2018 06:58 x64
Zipfldr.dll 6.0.6002.24305 342,528 10-Feb-2018 07:09 x86

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 4089175
Revision : 9
Created on : 3/8/2018
Published on : 3/13/2018
Exists online : False
Views : 200