MS16-086: Description of the security update for JScript 5.8 and VBScript 5.8: July 12, 2016

Summary
This security update resolves a vulnerability in the JScript and VBScript scripting engines in Microsoft Windows. The vulnerability could allow remote code execution if a user visits a specially crafted website. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on by using administrative user rights, an attacker who successfully exploited the vulnerabilities could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts that have full user rights.

To learn more about the vulnerability, see Microsoft Security Bulletin MS16-086.
More information
Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, seeGet security updates automatically.

Method 2: Microsoft Download Center

You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.

Click the download link in Microsoft Security Bulletin MS16-086 that corresponds to the version of Windows that you are running.
More information

How to obtain help and support for this security update

Help for installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support
File Information

File hash information

File nameSHA1 hashSHA256 hash
Windows6.1-KB3169658-ia64.msu1D5937E85E75DC1397436DE5B109165CA38442953D8A89F4E8CFF4C13F052342614057C1760CC4C347C644779AAC395D52A634A5
Windows6.1-KB3169658-x64.msuF7222BBF70112D6CF3319C8DC43EE9A198EA69D326F2735C72D2D940713C572C8995663B8E72228E118A82766C76BEDD4A427BD4

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows Server 2008 R2 file information

Notes

  • The files that apply to a specific product, milestone (RTM, SPn), and service branch (LDR, GDR) can be identified by examining the file version numbers as shown in the following table:
    Version Product Milestone Service branch
    6.1.760 1.18xxxWindows Server 2008 R2 SP1GDR
    6.1.760 1.23xxxWindows Server 2008 R2 SP1 LDR
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. LDR service branches contain hotfixes in addition to widely released fixes.
  • The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.
For all supported ia64-based versions
File nameFile versionFile sizeDateTimePlatform
Jscript.dll5.8.7601.234711,771,52014-Jun-201617:15IA-64
Vbscript.dll5.8.7601.234711,166,33614-Jun-201617:16IA-64
Jscript.dll5.8.7601.23471717,31214-Jun-201615:21x86
Vbscript.dll5.8.7601.23471432,12814-Jun-201615:21x86
For all supported x64-based versions
File nameFile versionFile sizeDateTimePlatform
Jscript.dll5.8.7601.23471910,84814-Jun-201617:16x64
Vbscript.dll5.8.7601.23471589,82414-Jun-201617:16x64
Jscript.dll5.8.7601.23471717,31214-Jun-201615:21x86
Vbscript.dll5.8.7601.23471432,12814-Jun-201615:21x86
Jscript.dll5.8.7601.23471717,31214-Jun-201615:21x86
malicious attacker exploit
Properties

Article ID: 3169658 - Last Review: 07/12/2016 17:19:00 - Revision: 1.0

Windows Server 2008 R2 Service Pack 1

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB3169658
Feedback