MS15-060: Vulnerability in Microsoft common controls could allow remote code execution: June 9, 2015

Applies to: Windows Server 2012 R2 DatacenterWindows Server 2012 R2 StandardWindows Server 2012 R2 Essentials


This security update resolves a vulnerability in Windows that could allow remote code execution if a user clicks a specially crafted link or a link to specially crafted content and then invokes F12 developer tools in Internet Explorer.


Microsoft has released security bulletin MS15-060. To learn more about this security bulletin:

How to obtain help and support for this security update

Help installing updates:
Support for Microsoft Update

Security solutions for IT professionals:
TechNet Security Troubleshooting and Support

Help protect your Windows-based computer from viruses and malware:
Virus Solution and Security Center

Local support according to your country:
International Support

More Information

Note This security update updates both versions 5 and 6 of Comctl32.dll. Comctl32.dll is always updated from the C:\Windows\WinSxs (Side By Side folder) folder. In other words, comctl32.dll is always used from the WinSxs folder. Therefore, this security update will update Comctl32.dll in C:\Windows\WinSxs folder. For more information about the versions of comctl32.dll, visit the following Microsoft MSDN webpage:

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.