Applies ToExchange Server 2016 Enterprise Edition Exchange Server 2016 Standard Edition Exchange Server 2013 SP1 Exchange Server 2013 Enterprise Edition Exchange Server 2013 Standard Edition

Summary

This security update resolves a vulnerability in Microsoft Exchange Outlook Web Access (OWA). The vulnerability could allow remote code execution in Microsoft Exchange Server if an attacker sends an email that has a specially crafted attachment to a vulnerable Exchange server.

To learn more about the vulnerability, see Microsoft Security Bulletin MS17-015.

How to get and install the update

This update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see Windows Update: FAQ.

You can get the stand-alone update package through the Microsoft Download Center. Click the download link in Microsoft Security Bulletin MS17-015 that corresponds to the version of Exchange Server that you are running.

More Information

Security update deployment information

For deployment information about this update, see Microsoft Knowledge Base article 4013242

Package Name

Package Hash SHA 1

Package Hash SHA 2

Exchange2013-KB4012178-x64-en.msp

97C00F21C45DC9E8BD2E8F3BC693AD3514BC3140

9CAE9710A8D36218AC19E26EA6F7447C622264B8FB6DB1A9508010BD76DB334A

Exchange2013-KB4012178-x64-en.msp

F7D39E3BA65CB6D9D5E4BAB796F1D2342ED75FC2

20A5BD4D292973A75A1C1709FBF3C291851B63ED10DEC37E304740D91A419F34

Exchange2016-KB4012178-x64-en.msp

72419E59F90C5DCD0943D12AB4EB31D8C7636508

9169DB31BF12824BFAC14AA5B8E1C94308AB4FB9E42A63000E208639CC7FD05C

For a list of the file attributes that are provided in this update, download the file information for update 4012178.

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.