MS15-069: Description of the security update for Windows: July 14, 2015

Important This fix is applicable only if RDP 8.1 is installed and enabled on the computer. For more information, see the prerequisites.
Summary
This security update resolves vulnerabilities in Microsoft Windows. The vulnerabilities could allow remote code execution if an attacker first places a specially crafted dynamic link library (DLL) file in the target user’s current working directory. Then, the attacker convinces the user to open an .rtf file or to start a program that is designed to load a trusted DLL file. But instead, the program loads the attacker’s specially crafted DLL file. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights. To learn more about the vulnerability, see Microsoft Security Bulletin MS15-069.

Important
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Get security updates automatically.

Method 2: Microsoft Download Center

You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

Click the download link in Microsoft Security Bulletin MS15-069 that corresponds to the version of Windows that you are running.

Prerequisites

More information

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows 7 and Windows Server 2008 R2 file information

  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table.
    VersionProductMilestoneService branch
    6.1.7601.18 xxxWindows 7 and Windows Server 2008 R2SP1GDR
    6.1.7601.22 xxxWindows 7 and Windows Server 2008 R2SP1LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
Note The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

For all supported x86-based versions of Windows 7

File nameFile versionFile sizeDateTimePlatform
Wksprt.exe6.3.9600.17901355,84011-Jun-201515:20x86
Wksprt.exe6.3.9600.17901355,84011-Jun-201515:18x86
Mstscax.dll6.3.9600.179016,131,20011-Jun-201517:57x86
Mstscax.mofNot applicable2,05503-Jun-201520:17Not applicable
Rdvidcrl.dll6.3.9600.16415856,06411-Jun-201517:57x86
Tsgqec.dll6.3.9600.1641553,24811-Jun-201517:57x86
Mstscax.dll6.3.9600.179016,131,20011-Jun-201517:23x86
Mstscax.mofNot applicable2,05503-Jun-201520:16Not applicable
Rdvidcrl.dll6.3.9600.16415856,06411-Jun-201517:23x86
Tsgqec.dll6.3.9600.1641553,24811-Jun-201517:23x86

For all supported x64-based versions of Windows 7 and Windows Server 2008 R2

File nameFile versionFile sizeDateTimePlatform
Wksprt.exe6.3.9600.17901429,56811-Jun-201513:15x64
Wksprt.exe6.3.9600.17901429,56811-Jun-201513:15x64
Mstscax.dll6.3.9600.179017,077,37611-Jun-201517:56x64
Mstscax.mofNot applicable2,05503-Jun-201520:17Not applicable
Rdvidcrl.dll6.3.9600.164151,057,79211-Jun-201517:56x64
Tsgqec.dll6.3.9600.1641562,97611-Jun-201517:56x64
Mstscax.dll6.3.9600.179017,077,37611-Jun-201517:54x64
Mstscax.mofNot applicable2,05503-Jun-201520:17Not applicable
Rdvidcrl.dll6.3.9600.164151,057,79211-Jun-201517:54x64
Tsgqec.dll6.3.9600.1641562,97611-Jun-201517:54x64
Mstscax.dll6.3.9600.179016,131,20011-Jun-201517:57x86
Mstscax.mofNot applicable2,05503-Jun-201520:17Not applicable
Rdvidcrl.dll6.3.9600.16415856,06411-Jun-201517:57x86
Tsgqec.dll6.3.9600.1641553,24811-Jun-201517:57x86
Mstscax.dll6.3.9600.179016,131,20011-Jun-201517:23x86
Mstscax.mofNot applicable2,05503-Jun-201520:16Not applicable
Rdvidcrl.dll6.3.9600.16415856,06411-Jun-201517:23x86
Tsgqec.dll6.3.9600.1641553,24811-Jun-201517:23x86

How to obtain help and support for this security update

Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE
Properties

Article ID: 3070738 - Last Review: 07/28/2015 22:47:00 - Revision: 2.0

Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB3070738
Feedback