Windows kernel information disclosure vulnerability: June 13, 2017

Attiecas uz: Windows Server 2008 FoundationWindows Server 2008 StandardWindows Server 2008 for Itanium-Based Systems


An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass.
To learn more about the vulnerability, see  CVE-2017-8481.

More Information

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

More Information

File Information

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2008 file information