Summary
This security update resolves vulnerabilities in Microsoft Windows. The most severe of the vulnerabilities could allow remote code execution if an authenticated attacker on a guest operating system runs a specially crafted application that causes the Hyper-V host operating system to execute arbitrary code. Customers who have not enabled the Hyper-V role are not affected. To learn more about the vulnerability, see Microsoft Security Bulletin MS17-008.
More Information
Important
-
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
How to obtain and install the update
Method 1: Windows Update
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Get security updates automatically.
Method 2: Microsoft Update Catalog
To get the stand-alone package for this update, go to the Microsoft Update Catalog website.
More Information
Help for installing updates: Windows Update FAQSecurity solutions for IT professionals: TechNet Security Support and TroubleshootingHelp for protecting your Windows-based computer from viruses and malware: Microsoft SecureLocal support according to your country: International Support
File Information
File hash information
|
File name |
SHA1 hash |
SHA256 hash |
|---|---|---|
|
Windows6.0-KB3211306-x64.msu |
6C5F30D6C1C17C60AF4B37E28CA3B69E31875D44 |
0EAD007F90A72240D7445FA1B98CF36000181AD899D000838435B613CFA824A4 |
File informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following tables.
Windows Vista and Windows Server 2008 file informationNote The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported x64-based versions
|
File name |
File version |
File size |
Date |
Time |
Platform |
|
Hvax64.exe |
6.0.6002.18688 |
651,264 |
31-Aug-2012 |
13:52 |
x64 |
|
Hvboot.sys |
6.0.6002.18688 |
108,416 |
31-Aug-2012 |
22:01 |
x64 |
|
Hvix64.exe |
6.0.6002.18688 |
672,256 |
31-Aug-2012 |
13:52 |
x64 |
|
Virtualization.events.xml |
Not applicable |
1,384 |
03-Apr-2009 |
21:20 |
Not applicable |
|
Hvax64.exe |
6.0.6002.24070 |
634,368 |
04-Mar-2017 |
02:36 |
x64 |
|
Hvboot.sys |
6.0.6002.24070 |
108,264 |
04-Mar-2017 |
03:38 |
x64 |
|
Hvix64.exe |
6.0.6002.24070 |
642,048 |
04-Mar-2017 |
02:36 |
x64 |
|
Virtualization.events.xml |
Not applicable |
1,384 |
07-Mar-2016 |
23:38 |
Not applicable |
|
Vmsntfy.dll |
6.0.6002.18327 |
62,464 |
14-Oct-2010 |
16:11 |
x64 |
|
Vmswitch.sys |
6.0.6002.19747 |
247,296 |
04-Mar-2017 |
02:28 |
x64 |
|
Vmsntfy.dll |
6.0.6002.24070 |
63,488 |
04-Mar-2017 |
02:40 |
x64 |
|
Vmswitch.sys |
6.0.6002.24070 |
247,296 |
04-Mar-2017 |
02:40 |
x64 |