Summary
An information disclosure vulnerability exists in the Microsoft Common Console Document (.msc) when it improperly parses XML input that contains a reference to an external entity. An attacker who successfully exploits this vulnerability could read arbitrary files via an XML external entity (XXE) declaration.
To learn more about the vulnerability, see CVE-2017-8710.
To learn more about the vulnerability, see CVE-2017-8710.
More Information
Important
- If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
How to obtain and install the update
Method 1: Windows Update
Method 2: Microsoft Update Catalog
Deployment information
For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
File Information
File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.
Windows Server 2008 file information
Notes
The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.