You are currently offline, waiting for your internet to reconnect

MS16-003: Description of the security update for JScript 5.7 and VBScript 5.7: January 12, 2016

Summary
This security update resolves a vulnerability in the VBScript scripting engine in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To learn more about the vulnerability, see Microsoft Security Bulletin MS16-003.
More information
Important
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Get security updates automatically.

Note For Windows RT and Windows RT 8.1, this update is available through Windows Update only.

Method 2: Microsoft Download Center

You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

Click the download link in Microsoft Security Bulletin MS16-003 that corresponds to the version of Windows that you are running.
More information

How to obtain help and support for this security update

Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support
File information

File hash information

File nameSHA1 hashSHA256 hash
Windows6.0-KB3124624-ia64.msu178DF358916930B048DB45D9C040760E9081EF0D1A2B28A16C9A62663385DA266BEA8A57EC1282B6DEDAD5E29E249A9DC9F5677A
Windows6.0-KB3124624-x86.msu3006258C7B5DB3E7E9054EC1B49E3F39C7451B8E3E1EBB4529A8C63F54D48C696D94E0EC38FBA20BB85A9E601460DF67EEF921D1
Windows6.0-KB3124624-x64.msu01DFA5E2317B7F65DEFD5123179D85E173E7111195FF69A54C84283B809828092E44E775FB5181CA977389E67EA439FE448B1A91

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). Be aware that dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time bias. The dates and times may also change when you perform certain operations on the files.

Windows Vista and Windows Server 2008 file information

Notes
  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    Version Product Milestone Service branch
    6.0.600 2.19xxxWindows Vista or Windows Server 2008SP2GDR
    6.0.600 2.23xxxWindows Vista or Windows Server 2008SP2LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported ia64-based versions
File nameFile versionFile sizeDateTimePlatform
Jscript.dll5.7.6002.195671,394,68810-Dec-201520:37IA-64
Jscript.dll5.7.6002.238771,395,20010-Dec-201520:21IA-64
Vbscript.dll5.7.6002.195671,173,50410-Dec-201520:39IA-64
Vbscript.dll5.7.6002.238771,175,55210-Dec-201520:22IA-64
Jscript.dll5.7.6002.19567516,09610-Dec-201521:07x86
Jscript.dll5.7.6002.23877516,09610-Dec-201520:44x86
Vbscript.dll5.7.6002.19567434,17610-Dec-201521:08x86
Vbscript.dll5.7.6002.23877434,17610-Dec-201520:45x86
For all supported x86-based versions
File nameFile versionFile sizeDateTimePlatform
Jscript.dll5.7.6002.19567516,09610-Dec-201521:07x86
Jscript.dll5.7.6002.23877516,09610-Dec-201520:44x86
Vbscript.dll5.7.6002.19567434,17610-Dec-201521:08x86
Vbscript.dll5.7.6002.23877434,17610-Dec-201520:45x86
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatform
Jscript.dll5.7.6002.19567755,20010-Dec-201520:53x64
Jscript.dll5.7.6002.23877755,20010-Dec-201520:35x64
Vbscript.dll5.7.6002.19567583,16810-Dec-201520:54x64
Vbscript.dll5.7.6002.23877583,16810-Dec-201520:36x64
Jscript.dll5.7.6002.19567516,09610-Dec-201521:07x86
Jscript.dll5.7.6002.23877516,09610-Dec-201520:44x86
Vbscript.dll5.7.6002.19567434,17610-Dec-201521:08x86
Vbscript.dll5.7.6002.23877434,17610-Dec-201520:45x86
malicious attacker exploit
Properties

Article ID: 3124624 - Last Review: 01/12/2016 18:26:00 - Revision: 1.0

Windows Server 2008 Service Pack 2, Windows Vista Service Pack 2

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB3124624
Feedback
/body>ar varAutoFirePV = 1; var varClickTracking = 1; var varCustomerTracking = 1; var Route = "76500"; var Ctrl = ""; document.write("