MS15-042: Vulnerability in Windows Hyper-V could allow denial of service: April 14, 2015

Summary
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow denial of service if an authenticated attacker runs a specially crafted application in a virtual machine (VM) session. Notice that the denial of service does not allow an attacker to execute code or elevate user rights on other VMs that are running on the Hyper-V host. However, the issue could cause other VMs on the host not to be manageable in Virtual Machine Manager.
Introduction
Microsoft has released security bulletin MS15-042. To learn more about this security bulletin:

How to obtain help and support for this security update

Help installing updates:Support for Microsoft Update

Security solutions for IT professionals:TechNet Security Troubleshooting and Support

Help protect your Windows-based computer from viruses and malware:Virus Solution and Security Center

Local support according to your country:International Support

More information

Known issues in this security update

  • After you install this security update, you may find that old file location cleanup operations are affected when you run a storage migration of Cluster Shared Volume (CSV). To resolve this issue, install vmms.exe version 6.3.9600.17787, included in update 3037313.For more information, click the following article number to view the article in the Microsoft Knowledge Base:
    3037313 Old files are not removed after a migration of virtual machine storage in Windows 8.1 or Windows Server 2012 R2

Security update deployment information

Windows 8.1 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported x64-based editions of Windows 8.1:
Windows8.1-KB3047234-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationTo uninstall an update that is installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, click Windows Update, and under See also, click Installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.

Windows Server 2012 R2 (all editions)

Reference Table

The following table contains the security update information for this software.
Security update file nameFor all supported editions of Windows Server 2012 R2:
Windows8.1-KB3047234-x64.msu
Installation switchesSee Microsoft Knowledge Base Article 934307
Restart requirementYes, you must restart your system after you apply this security update.
Removal informationTo uninstall an update installed by WUSA, use the /Uninstall setup switch. Or, click Control Panel, click System and Security, click Windows Update, and under See also, click Installed updates, and then select from the list of updates.
File informationSee the file information section.
Registry key verificationNote A registry key does not exist to validate the presence of this update.
File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows 8.1 and Windows Server 2012 R2 file information

For all supported x64-based versions of Windows 8.1 and Windows Server 2012 R2

File nameFile versionFile sizeDateTimePlatform
Vmms.exe.mui6.3.9600.17039861,18404-Mar-201418:07Not Applicable
Vmms.exe.mui6.3.9600.17039851,96804-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039980,99204-Mar-201417:59Not Applicable
Vmms.exe.mui6.3.9600.17039997,88804-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039784,38404-Mar-201411:29Not Applicable
Vmms.exe.mui6.3.9600.17039937,98404-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039815,10404-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039953,34404-Mar-201418:07Not Applicable
Vmms.exe.mui6.3.9600.17039884,73604-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039921,08804-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039482,30404-Mar-201418:06Not Applicable
Vmms.exe.mui6.3.9600.17039485,37604-Mar-201418:04Not Applicable
Vmms.exe.mui6.3.9600.17039834,56004-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039894,46404-Mar-201418:03Not Applicable
Vmms.exe.mui6.3.9600.17039922,11204-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039871,42404-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039896,00004-Mar-201418:02Not Applicable
Vmms.exe.mui6.3.9600.17039865,28004-Mar-201418:03Not Applicable
Vmms.exe.mui6.3.9600.17039855,55204-Mar-201417:58Not Applicable
Vmms.exe.mui6.3.9600.17039794,11204-Mar-201417:58Not Applicable
Vmms.exe.mui6.3.9600.17039344,06404-Mar-201417:59Not Applicable
Vmms.exe.mui6.3.9600.17039360,44804-Mar-201417:59Not Applicable
Vmms.exe.mui6.3.9600.17039360,44804-Mar-201417:59Not Applicable
Rdvgpuinfo.dll6.3.9600.1739661,44008-Oct-201405:58x64
Vmms.exe6.3.9600.1772913,784,06414-Mar-201500:18x64

File hash information

Package NamePackage Hash SHA1Package Hash SHA2
Windows8.1-KB3047234-x64.msuA5F423BBFEFA3E371B7C5F89366D86BC3B58F6C63A9166396B13491207C199A204D58D27230034A2EA8466A3F891A174AE6A0059
Windows8.1-KB3047234-x64.msu25A4C4F35A74FB331416342D757F8D97182345E177CE6D303DAF1EFB7EB2F5F2A7EE186F875FC2CD1F258D5AAEF75C468E89034B
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE
Properties

Article ID: 3047234 - Last Review: 10/05/2015 20:32:00 - Revision: 2.0

Windows Server 2012 R2 Datacenter, Windows Server 2012 R2 Standard, Windows Server 2012 R2 Essentials, Windows Server 2012 R2 Foundation, Windows 8.1 Enterprise, Windows 8.1 Pro, Windows 8.1

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB3047234
Feedback