Applies ToWindows Vista Service Pack 2 Windows Vista Home Basic Windows Vista Home Premium Windows Vista Business Windows Vista Ultimate Windows Vista Enterprise Windows Vista Starter Windows XP Microsoft Windows XP Professional Microsoft Windows XP Home Edition

Summary

Microsoft has released a security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To learn more about the vulnerability, go to advisory 4025685.

Guidance for older platforms

This section summarizes resources for customers who are running Windows XP, Windows Vista, Windows 8, or Windows Server 2003. At the time of release of this advisory (June 13, 2017), these platforms are no longer in mainstream or extended support. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.

Note This update does not check for Windows Genuine Advantage status.

For customers on these older platforms, the following tables provide information to manually download applicable security updates. Microsoft’s decision to release security updates for the additional platforms today should not be interpreted as a change in policy. Customers are encouraged to upgrade to a supported platform.

Vulnerability information

For more information about individual vulnerabilities addressed by these releases, follow the links at the top of each column.

Older platforms table 1 of 3

Operating system

MS08-067

MS09-050

MS10-061

MS14-068

MS17-010

MS17-013

Windows XP

Windows XP Service Pack 3

958644

Not affected

2347290

Not affected

4012598

4012583

Microsoft Windows XP Professional x64 Edition Service Pack 2

958644

Not affected

2347290

Not affected

4012598

4012583

Windows Server 2003

Windows Server 2003 Service Pack 2

958644

Not affected

2347290

3011780

4012598

4012583

Windows Server 2003 x64 Edition Service Pack 2

958644

Not affected

2347290

3011780

4012598

4012583

Windows Vista

Windows Vista Service Pack 2

Not affected

975517

2347290

Not affected

4012598

Not affected

Windows Vista x64 Edition Service Pack 2

Not affected

975517

2347290

Not affected

4012598

Not affected

Windows 8

Windows 8 for 32-bit Systems

Not affected

Not affected

Not affected

Not affected

4012598

4012583

Windows 8 for x64-based Systems

Not affected

Not affected

Not affected

Not affected

4012598

4012583

 

Older platforms table 2 of 3

Operating system

CVE-2017-0176

CVE-2017-0222

CVE-2017-0267 to 0280

CVE-2017-7269

CVE-2017-8461

CVE-2017-8464

Windows XP

Windows XP Service Pack 3

4022747

Internet Explorer 84018271

4018466

3197835

4024323

Not affected

Microsoft Windows XP Professional x64 Edition Service Pack 2

4022747

Internet Explorer 84018271

4018466

3197835

4024323

Not affected

Windows Server 2003

Windows Server 2003 Service Pack 2

4022747

Mitigated in default scenarios [1]

4018466

3197835

4024323

Not affected

Windows Server 2003 x64 Edition Service Pack 2

4022747

Mitigated in default scenarios [1]

4018466

3197835

4024323

Not affected

Windows Vista

Windows Vista Service Pack 2

Not affected

Internet Explorer 94018271

4018466

Not affected

Not affected

4021903

Windows Vista x64 Edition Service Pack 2

Not affected

Internet Explorer 94018271

4018466

Not affected

Not affected

4021903

Windows 8

Windows 8 for 32-bit Systems

Not affected

Internet Explorer 104018271

4019623

Not affected

Not affected

4022839

Windows 8 for x64-based Systems

Not affected

Internet Explorer 104018271

4019623

Not affected

Not affected

4022839

 

[1] - By default, Internet Explorer on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted web content on a server. This is a mitigating factor for websites that you have not added to the Internet Explorer Trusted sites zone.

 

Older platforms table 3 of 3

Operating system

CVE-2017-8487

CVE-2017-8543

CVE-2017-8552

Windows XP

Windows XP Service Pack 3

4025218

4024402

4019204

Microsoft Windows XP Professional x64 Edition Service Pack 2

4025218

4024402

4019204

Windows Server 2003

Windows Server 2003 Service Pack 2

4025218

4024402

4019204

Windows Server 2003 x64 Edition Service Pack 2

4025218

4024402

4019204

Windows Vista

Windows Vista Service Pack 2

Not affected

4024402

4019204

Windows Vista x64 Edition Service Pack 2

Not affected

4024402

4019204

Windows 8

Windows 8 for 32-bit Systems

Not affected

4022839

4022839

Windows 8 for x64-based Systems

Not affected

4022839

4022839

Frequently asked questions

I am running Internet Explorer on Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2. Does this mitigate these vulnerabilities? Yes. By default, Internet Explorer on Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012 R2 runs in a restricted mode that is known as Enhanced Security Configuration. Enhanced Security Configuration is a group of preconfigured settings in Internet Explorer that can reduce the likelihood of a user or administrator downloading and running specially crafted web content on a server. This is a mitigating factor for websites that you have not added to the Internet Explorer Trusted sites zone.

Are these new releases for these platforms? No. To help customers understand support for all platforms related to these updates we have assembled this page to discuss operating system versions that are in mainstream or extended support.

My operating system version is not listed here. Are updates available for other versions? For newer operating systems still in mainstream or extended support, refer to this page. For other variations of operating systems listed above (i.e., RTM or different service pack levels), there are no updates available. Customers should update to the latest service pack version to receive security updates.

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.