You are currently offline, waiting for your internet to reconnect

MS15-014: Vulnerability in Group Policy could allow security feature bypass: February 10, 2015

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

Summary
This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker, by way of a man-in-the-middle attack, causes the Group Policy Security Configuration Engine policy file on a targeted system to become corrupted or otherwise unreadable. This results in the Group Policy settings on the system to revert to their default, and potentially less secure, state.
Introduction
Microsoft has released security bulletin MS15-014. To learn more about this security bulletin:

How to obtain help and support for this security update

Help installing updates:Support for Microsoft Update

Security solutions for IT professionals:TechNet Security Troubleshooting and Support

Help protect your Windows-based computer from viruses and malware:Virus Solution and Security Center

Local support according to your country:International Support

More information

Security update deployment information

Windows Server 2003 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file namesFor all supported 32-bit editions of Windows Server 2003:
WindowsServer2003-KB3004361-x86-ENU.exe
For all supported x64-based editions of Windows Server 2003:
WindowsServer2003-KB3004361-x64-ENU.exe
For all supported Itanium-based editions of Windows Server 2003:
WindowsServer2003-KB3004361-ia64-ENU.exe
Installation switchesSee Microsoft Knowledge Base Article 934307
Update log fileKB3004361.log
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationUse Add or RemovePrograms item in Control Panel or the Spuninst.exe utility that is located in the %Windir%\$NTUninstallKB3004361$\Spuninst folder
File informationSee the file information section.
Registry key verificationHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows Server 2003\SP3\KB3004361\Filelist

Windows Vista (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file namesFor all supported 32-bit editions of Windows Vista:
Windows6.0-KB3004361-x86.msu
For all supported x64-based editions of Windows Vista:
Windows6.0-KB3004361-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationWUSA.exe does not support uninstall of updates. To uninstall an update that is installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows Server 2008 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file namesFor all supported 32-bit editions of Windows Server 2008:
Windows6.0-KB3004361-x86.msu
For all supported x64-based editions of Windows Server 2008:
Windows6.0-KB3004361-x64.msu
For all supported Itanium-based editions of Windows Server 2008:
Windows6.0-KB3004361-ia64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationWUSA.exe does not support uninstall of updates. To uninstall an update that is installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows 7 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported 32-bit editions of Windows 7:
Windows6.1-KB3004361-x86.msu
For all supported x64-based editions of Windows 7:
Windows6.1-KB3004361-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationTo uninstall an update installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, and under Windows Update, click View installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows Server 2008 R2 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported x64-based editions of Windows Server 2008 R2:
Windows6.1-KB3004361-x64.msu
For all supported Itanium-based editions of Windows Server 2008 R2:
Windows6.1-KB3004361-ia64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationTo uninstall an update that is installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, and under Windows Update, click View installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows 8 and Windows 8.1 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported 32-bit editions of Windows 8:
Windows8-RT-KB3004361-x86.msu
For all supported x64-based editions of Windows 8:
Windows8-RT-KB3004361-x64.msu
For all supported 32-bit editions of Windows 8.1:
Windows8.1-KB3004361-x86.msu
For all supported x64-based editions of Windows 8.1:
Windows8.1-KB3004361-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationTo uninstall an update installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, click Windows Update, and under See also, click Installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows Server 2012 and Windows Server 2012 R2 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported editions of Windows Server 2012:
Windows8-RT-KB3004361-x64.msu
For all supported editions of Windows Server 2012 R2:
Windows8.1-KB3004361-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationTo uninstall an update installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, click Windows Update, and under See also, click Installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows RT and Windows RT 8.1 (all editions)

Reference Table

The following table contains the security update information for this software.
DeploymentThese updates are available only through Windows Update.
Restart RequirementYes, you must restart your system after you apply this security update.
Removal InformationClick Control Panel, click System and Security, click Windows Update, and under See also, click Installed updates, and then select from the list of updates.
File InformationSee the file information section.
File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows Server 2003 file information

  • The files that apply to a specific milestone (SPn) and service branch (QFE, GDR) are noted in the "SP requirement" and "Service branch" columns.
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.
  • In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KBnumber.cat) that is signed with a Microsoft digital signature.

For all supported x64-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Spuninst.exe6.3.4.1293,16808-Dec-201421:39x64NoneNot Applicable
Scesrv.dll5.2.3790.5492609,79208-Dec-201421:36x64SP2SP2QFE

For all supported x86-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Spuninst.exe6.3.4.1221,48816-May-201403:14x86NoneNot Applicable
Scesrv.dll5.2.3790.5492335,36008-Dec-201421:29x86SP2SP2QFE

For all supported IA-64-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Spuninst.exe6.3.4.1501,55208-Dec-201421:39IA-64NoneNot Applicable
Scesrv.dll5.2.3790.5492825,85608-Dec-201421:35IA-64SP2SP2QFE

Windows Vista and Windows Server 2008 file information

  • The files that apply to a specific product, milestone (SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.0.6002.18xxxWindows Vista SP2 and Windows Server 2008 SP2SP2GDR
    6.0.6002.23xxxWindows Vista SP2 and Windows Server 2008 SP2SP2LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

For all supported x86-based versions of Windows Vista and Windows Server 2008

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.0.6002.19251306,17608-Dec-201401:59x86
Scesrv.dll6.0.6002.23558306,68808-Dec-201401:27x86

For all supported x64-based versions of Windows Vista and Windows Server 2008

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.0.6002.19251399,36008-Dec-201401:37x64
Scesrv.dll6.0.6002.23558400,38408-Dec-201401:20x64
Scesrv.dll6.0.6002.19251306,17608-Dec-201401:59x86
Scesrv.dll6.0.6002.23558306,68808-Dec-201401:27x86

For all supported IA-64-based versions of Windows Server 2008

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.0.6002.19251803,32808-Dec-201401:19IA-64
Scesrv.dll6.0.6002.23558805,88808-Dec-201400:58IA-64
Scesrv.dll6.0.6002.19251306,17608-Dec-201401:59x86
Scesrv.dll6.0.6002.23558306,68808-Dec-201401:27x86

Windows 7 and Windows Server 2008 R2 file information

  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.1.7601.18xxxWindows 7 and Windows Server 2008 R2SP1GDR
    6.1.7601.22xxxWindows 7 and Windows Server 2008 R2SP1LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

For all supported x86-based versions of Windows 7

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.1.7601.18686308,22408-Dec-201402:46x86
Scesrv.dll6.1.7601.22894308,22408-Dec-201403:03x86

For all supported x64-based versions of Windows 7 and Windows Server 2008 R2

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.1.7601.18686406,52808-Dec-201403:09x64
Scesrv.dll6.1.7601.22894407,04008-Dec-201403:28x64
Scesrv.dll6.1.7601.18686308,22408-Dec-201402:46x86
Scesrv.dll6.1.7601.22894308,22408-Dec-201403:03x86

For all supported IA-64-based versions of Windows Server 2008 R2

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.1.7601.18686814,08008-Dec-201402:17IA-64
Scesrv.dll6.1.7601.22894814,59208-Dec-201402:10IA-64
Scesrv.dll6.1.7601.18686308,22408-Dec-201402:46x86
Scesrv.dll6.1.7601.22894308,22408-Dec-201403:03x86

Windows 8 and Windows Server 2012 file information

  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    VersionProductMilestoneService branch
    6.2.920 0.16 xxxWindows 8 and Windows Server 2012RTMGDR
    6.2.920 0.20 xxxWindows 8 and Windows Server 2012RTMLDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

For all supported x86-based versions of Windows 8

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.2.9200.17200318,46408-Dec-201405:04x86
Scesrv.dll6.2.9200.21317318,46408-Dec-201404:31x86

For all supported x64-based versions of Windows 8 and Windows Server 2012

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.2.9200.17200391,16808-Dec-201406:48x64
Scesrv.dll6.2.9200.21317391,16808-Dec-201405:31x64
Scesrv.dll6.2.9200.17200318,46408-Dec-201405:04x86
Scesrv.dll6.2.9200.21317318,46408-Dec-201404:31x86

Windows 8.1 and Windows Server 2012 R2 file information

For all supported x86-based versions of Windows 8.1

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.3.9600.17552393,72809-Dec-201403:45x86

For all supported x64-based versions of Windows 8.1 and Windows Server 2012 R2

File nameFile versionFile sizeDateTimePlatform
Scesrv.dll6.3.9600.17552538,62409-Dec-201401:56x64
Scesrv.dll6.3.9600.17552393,72809-Dec-201403:45x86

File hash information

File nameSHA1 hashSHA256 hash
Windows6.0-KB3004361-ia64.msuC50A87F893DB57F3B40DB7EF7D3F07ED63D10B168B82D809162C74FA801EC7BFF16C6318003FCEC979A56AAAE23F9FE536A08C9D
Windows6.0-KB3004361-x64.msu0DE0183342D76854632B9337F33C693F45D90178C804A1C09AE3EB8CFFAEFF4CDC41976C7099B15975AE8502EDE09F1B0945C802
Windows6.0-KB3004361-x86.msu63E42C02664A9AB7D5571868E7D30C4BEECA9193069818EE396AE14275B732C8A3298739A18478FEA7E93ADE8CC39ED712661329
Windows6.1-KB3004361-ia64.msuE0F69E5DE3792B3F6B9CCBC5FEF6B82C5481E8985B34EE7F2A09BC3F3221A62A33EDDD68D6916D4DD94D36442C8271DA32E8FDF5
Windows6.1-KB3004361-x64.msuAA0D59A0ACA5F637296E30BCA4C193E90EFC321FCB208FFF83493B26B17D420BEF0C604181416453BE1C6F1F12FF8FEDDDFD9F82
Windows6.1-KB3004361-x86.msuF33440377CD26659995813D31DD454F97A1387C4E440D68A4F10B57DF6FBF38AFA712708F4BB328816164E013B8CD24E7E6ED58E
Windows8.1-KB3004361-arm.msu95632B1FDE86A8AECE1B7A7003434A8D48FA7C0876D257EC18C3A8BE60977C59DB46CCCE3958F633A08CC99259003AA6D243FCE9
Windows8.1-KB3004361-x64.msu19E7D86A45D17E8A66FF31166F9F7C00924FB244C6C40BEEF29775C534485EF4A1A85C42B285E349A19D29F227056FD163A29050
Windows8.1-KB3004361-x86.msu07685FC9BEC348716002525FB92D0F236E0066393EFC58CD5EC3E64F4DED6D8A0B95D2EE1AB9DCDDEE625AFDCD16A19FF0B92E1B
Windows8-RT-KB3004361-arm.msuE5DF69E5297C351B0C3475A098077E846C159CE18DECBE08CAA4181A009269CF716F4AD2EB809F99F6985C4E75943D1B52716CE5
Windows8-RT-KB3004361-x64.msu2A0989250844BDE3C2D1E86553D64E42F89BE07D0A64EB088CC8E0EF1D5367457430404340723D228D099C9A4042282A8C31C2BF
Windows8-RT-KB3004361-x86.msu2D0A8AEF0D3440C8A401F72B8E8155BBD4CCCE8062EEFEE67AF1C5CD254B755F085B000ECBC0CB9F2EAD10D77EEFFE0443EEAAEB
WindowsServer2003-KB3004361-ia64-DEU.exe8E64C225AE7F68BAE4BF7443B419CF34C556B12031A1CC0174F1FAA5B00E7481E6570B31CD9355326CDE47101BDB706343AB8FAF
WindowsServer2003-KB3004361-ia64-ENU.exeA0E8C724B0DC5449B49B1A4EABD9EB1334C6E0153F97CB0C8F5A7D63672E68A6B261859F0D08E48705ECAE311238F3655CA79BAE
WindowsServer2003-KB3004361-ia64-FRA.exe08418228A8C362F2B833CB04AC0D14D60CF5DD4BABF4B833D5B44CC5CC07D4BA64499E7643DCD03847471A7A68B7222098D29FC0
WindowsServer2003-KB3004361-ia64-JPN.exeABD15CFB39175C14561057DE76FD3A970B195CA846C197FF563E93C26001B168FD12FEDDA914C03AF58C34F0CC9CB5851E3E9A03
WindowsServer2003-KB3004361-x64-CHS.exeE262731D940F3CE1AEE5C00619252FD6049DE47EE0C45560950D8613D6B4115E3D3650AE66E1AE701313129139628A1E639E9D6B
WindowsServer2003-KB3004361-x64-CHT.exeC7B025D73ACBAAEEEACF7BC664F008E9A7CFD3206D810BC5046216D0715D92A8E51BEBFB8F282F062913CAD86701C5DC26719630
WindowsServer2003-KB3004361-x64-DEU.exe4F5ECAE5DFB5C642C922132B71F555FF71FAD3FBA7808D6DA03778A0DD247A4BDA7591BC9C0F8EF45F1B82215AB11BD6B84B6414
WindowsServer2003-KB3004361-x64-ENU.exe7C863CD5A4973C9FA17F49CF6C76B97936CA033427DC8C17704B0AA95A679BEB12FE6EDD1D23317D5F8ED560E56E0EE7ACAA76F2
WindowsServer2003-KB3004361-x64-ESN.exe4E9A491EC91EA4AD9247B21A0AF07B6946D9718F36F09E97FE6317CFDD7BE1FDB1EC10320780134EF0FB87669AE77592E64C4CFA
WindowsServer2003-KB3004361-x64-FRA.exeCD897E23500D4D11972B84C491A138F4D85B1AF1E16D748077FCE829B613DBE8B161A8F33BC06E379F9F03EB136C16ADC84CB2DD
WindowsServer2003-KB3004361-x64-ITA.exe3DF9CF453F43C50DEC83F8C37DF220CAABE325565032C680C5C3982F606CBE6773A6AF2DF1C489F4136279B5F7DD92D78A8189A5
WindowsServer2003-KB3004361-x64-JPN.exe14B7CB560834F65B5E44130FD6003D10C455D95F9F0CEAF6A06EA60D98D9EF56BE02F7D7459C6BC4AA36C4C77955D0C2CA47D434
WindowsServer2003-KB3004361-x64-KOR.exe14162CD11959E117EBC27DDBD7FA28B90127BDD022F58FEC204E8063D0434DE603D85C8636142E87DE95E18920F6E1ADB9C6B85D
WindowsServer2003-KB3004361-x64-PTB.exeD5BDFC7643B0734066FCCAE1E5DA55A29EB3C4362F5EB89F0C2609556032A23C9A85E5EF3A0B75EBB22A34E161A8E775F3658331
WindowsServer2003-KB3004361-x64-RUS.exeE2E9437C3EED805C7A329C856956405698BF9A7432C27A3D2FA0E37EB38BE274D29D3896A3ACE2D11464AF8A9E6C6657A61B486D
WindowsServer2003-KB3004361-x86-CHS.exe99D472C46639D222CDA71F46A7C11BB21B85C3DD791157AAC9E37366D483A928A2471EDA45905793D1653C29C7220FAEEB95EF25
WindowsServer2003-KB3004361-x86-CHT.exeC23718EFF2D71ACCFB5FAE50570FA41644927E4D2A629B1A53559F24FFC1FE8D23D3CBD1E1C38590E89F14AAD3FC76C084C34FD5
WindowsServer2003-KB3004361-x86-CSY.exe259B51D588B0AA3BF9A29281948F3FBB4FE359B3D2CED9800D191FF0E0FB2BBCBB3ADE2468691AB0848D96D51EA8B3798B90A6AD
WindowsServer2003-KB3004361-x86-DEU.exe48E5D7EA5BED0970B8A35DA72143E425AB847C7614CD88B498344A68BB2B46CC9AFCFAC0068875D34537247093A842E88251576A
WindowsServer2003-KB3004361-x86-ENU.exe82711F3B6C8A9983EFF86B9AEE1E85ED0C2049B2458586C51FECC30F4D1AC9B627B14FAE6C71C044CBED495E8F32782074BB436D
WindowsServer2003-KB3004361-x86-ESN.exe31AA0D9E555C98CE72D7CC495B1A737DF01F90BD545F79FBEE041EF6ABAF0B79C3F5D587B42BA6FB0347F76B1A1B0AD06A3961D3
WindowsServer2003-KB3004361-x86-FRA.exe6B488D290449CD4A1A019C692EF034F2AC926C44CE0CD6FE427A9EA1A63D5C80B7C229757C27140DE9B902AC95938968CE9E3CA5
WindowsServer2003-KB3004361-x86-HUN.exe5D5E0EDF7400D4BCA21599B428F81EDEC14A2EB32416A6C56CB77BB98AC1B9851E31B833EE34DB4710D43E14F0F2F2BA173B00C6
WindowsServer2003-KB3004361-x86-ITA.exeE70AF4B84A8794ACE81F2A2AD0A0DA423DEF62111ED047AA8D9875A10110C891283396CC5395E50D16DAC16996E65B6FB85F2EA8
WindowsServer2003-KB3004361-x86-JPN.exeEC5EAA1E02639AAC93EA2C26553361C1D9B4F8BEBDB1D141DF5217A9A6635212F6CF6700DF5E94A88F8F647E751662F1AEA4B54C
WindowsServer2003-KB3004361-x86-KOR.exeC3C82EC88899D43B9A3547E08FC13C8C1E2148C4BFB8319031B4A8FFFF1E83FA2F27EAFDCCD7B36B3DBEE49BD96CD07A8DED0748
WindowsServer2003-KB3004361-x86-NLD.exeA17789610EB49524949A82AC180CEFB30B5C9647A00087FDDF06C561BB1D5CABBB4EF47D25F73970AD0F4DEC31F0C63D368CC547
WindowsServer2003-KB3004361-x86-PLK.exe2660A61D1F67BA187A4626710FE2FC84E9D2A34BE733A4DA7E82F0D21FC68E08003D86A601CCEEF3621C752A59DB6964B883138D
WindowsServer2003-KB3004361-x86-PTB.exe8E9615619D877D6FFFE1C5B8CA52F2018025A4A22747DC56C3A707382E0F1616B0777E547C1E3D5BE691F9BECC386DA80987076E
WindowsServer2003-KB3004361-x86-PTG.exe4540ECD79A7570A90A3863D51D49832699E46137C0D44DC5FD3A05BB5D83EA42C5A196D4A3548495F1F0B0CEAE79A9F4D27494AF
WindowsServer2003-KB3004361-x86-RUS.exeC1EA45FB4E589D50FE677F50BFBBA5FF83250900422B9CFC58600502599FC7B0C6E67AFFD9C9FA174C4C71BD70530951378DDC73
WindowsServer2003-KB3004361-x86-SVE.exe7FAE2E8F73B9A2F249C8E946C4A3484CFB27515384994709B2670E367AA80E5AD89878C117A5874D2ABC724A6163FADFC5873565
WindowsServer2003-KB3004361-x86-TRK.exe35201146CF4507A2A6277CF19CCA310C18E0E912A6FCF66B42ED44CACE19199B51800D16D1188468AA123E60BBCAD695444DB865
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE
Properties

Article ID: 3004361 - Last Review: 02/10/2015 18:05:00 - Revision: 1.0

Windows Server 2012 R2 Datacenter, Windows Server 2012 R2 Standard, Windows Server 2012 R2 Essentials, Windows Server 2012 R2 Foundation, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8.1, Windows RT 8.1, Windows Server 2012 Datacenter, Windows Server 2012 Standard, Windows Server 2012 Essentials, Windows Server 2012 Foundation, Windows 8 Enterprise, Windows 8 Pro, Windows 8, Windows RT, Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1, Windows Server 2008 Service Pack 2, Windows Vista Service Pack 2, Microsoft Windows Server 2003 Service Pack 2

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB3004361
Feedback
qp0';m.content='true';document.getElementsByTagName('head')[0].appendChild(m);" onload="var m=document.createElement('meta');m.name='ms.dqp0';m.content='false';document.getElementsByTagName('head')[0].appendChild(m);" src="http://c1.microsoft.com/c.gif?"> ft.com/c.gif?DI=4050&did=1&t=">