Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update for the remote code execution vulnerability in Windows Server 2008: August 14, 2018


View products that this article applies to.

Summary

A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.

To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.
Important
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File Information

File hash information
File name SHA1 hash SHA256 hash
Windows6.0-KB4340939-x86.msu B88325BF4AC01BAD639E163D5E1484DC9F2E13F1 DF0756DAF3215FFA9B7BFF43EE602AAD71E006056614AEAEAC9F2092A6C8EF72
Windows6.0-KB4340939-ia64.msu 64FC082BC23A1B6942152A2AFD5F0B4DAC07AE68 33EB4203D67988669EED689F530AD4771D7F36265DAC7EE61ACA2B36C73D4DBA
Windows6.0-KB4340939-x64.msu 27B6A52C60ED2845B4F7A8F1C774047407851FAD 6C915207E37BF3B86EF82533FFEAD3B2CDACB59CD1199813B5D8BDD2FEDA4916

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

Windows Server 2008 file information

For all supported x86-based versions
File name File version File size Date Time Platform
Msshsq.dll 7.0.6002.24434 231,936 20-Jun-2018 14:54 x86
For all supported ia64-based versions
File name File version File size Date Time Platform
Msshsq.dll 7.0.6002.24434 661,504 20-Jun-2018 14:57 IA-64
Msshsq.dll 7.0.6002.24434 231,936 20-Jun-2018 14:54 x86
For all supported x64-based versions
File name File version File size Date Time Platform
Msshsq.dll 7.0.6002.24434 318,464 20-Jun-2018 14:39 x64
Msshsq.dll 7.0.6002.24434 231,936 20-Jun-2018 14:54 x86

↑ Back to the top


Keywords: kbsurveynew, kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, kbfix, kblangall, kb, kbexpertiseinter, kbbug, atdownload, kbmustloc

↑ Back to the top

Article Info
Article ID : 4340939
Revision : 6
Created on : 8/9/2018
Published on : 8/14/2018
Exists online : False
Views : 253