This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory. Then, the attacker convinces the user to open an .rtf file or to start a program that is designed to load a trusted DLL file. But instead, the program loads the attacker’s specially crafted DLL file. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. To learn more about the vulnerability, see Microsoft Security Bulletin MS15-069.
- If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
Article ID: 3070738 - Last Review: Jul 28, 2015 - Revision: 1
Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Datacenter, Windows Server 2008 R2 Enterprise, Windows Server 2008 R2 Standard, Windows Web Server 2008 R2, Windows Server 2008 R2 Foundation, Windows 7 Service Pack 1, Windows 7 Ultimate, Windows 7 Enterprise, Windows 7 Professional, Windows 7 Home Premium, Windows 7 Home Basic, Windows 7 Starter