Summary
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory. CVE-2017-8488.
To learn more about the vulnerability, seeMore Information
Important
-
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
How to obtain and install the update
Method 1: Windows Update
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the stand-alone package for this update, go to the Microsoft Update Catalog website.
Deployment information
For deployment details for this security update, see the following article in the Microsoft Knowledge Base:
More Information
File information The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. Windows Server 2008 file information
Note:Â The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ Security solutions for IT professionals: TechNet Security Support and Troubleshooting Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure Local support according to your country: International Support
File Information
File hash information
File name |
SHA1 hash |
SHA256 hash |
---|---|---|
Windows6.0-KB4022010-ia64.msu |
A840C7406BB3E3153721B771DA53EA832FC421E1 |
09C5BF6B752E1868043DA34DF22B1A4515F05A4677C0ADFD2C8D1123E756B851 |
Windows6.0-KB4022010-x64.msu |
C745EA2ABC09BA1D4ECF27FD26FF1E96E3F76F5D |
BC35C487FAE545C01BB2112C783E585C5D024EB25813A0BDEDB99AECE1AE9F30 |
For all supported ia64-based versions
File name |
File version |
File size |
Date |
Time |
Platform |
Mountmgr.sys |
6.0.6002.19784 |
167,656 |
10-May-2017 |
15:53 |
IA-64 |
Msmmsp.dll |
6.0.6002.19784 |
23,552 |
10-May-2017 |
15:46 |
IA-64 |
Mountmgr.sys |
6.0.6002.24102 |
167,656 |
10-May-2017 |
15:22 |
IA-64 |
Msmmsp.dll |
6.0.6002.24102 |
23,552 |
10-May-2017 |
15:17 |
IA-64 |
For all supported x64-based versions
File name |
File version |
File size |
Date |
Time |
Platform |
Mountmgr.sys |
6.0.6002.19784 |
68,328 |
10-May-2017 |
16:12 |
x64 |
Msmmsp.dll |
6.0.6002.19784 |
11,264 |
10-May-2017 |
16:06 |
x64 |
Mountmgr.sys |
6.0.6002.24102 |
68,328 |
10-May-2017 |
18:09 |
x64 |
Msmmsp.dll |
6.0.6002.24102 |
11,264 |
10-May-2017 |
18:03 |
x64 |