Sign in with Microsoft
Sign in or create an account.
Hello,
Select a different account.
You have multiple accounts
Choose the account you want to sign in with.

Summary

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory via the Microsoft Windows Text Services Framework.

To learn more about the vulnerability, go to CVE-2017-8727.

More Information

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Deployment information

For deployment details for this security update, see the following article in the Microsoft Knowledge Base:

Security update deployment information: October 10, 2017

More Information


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows Server 2008 file information

Note: The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

How to obtain help and support for this security update

Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

File Information

File hash information

File name

SHA1 hash

SHA256 hash

Windows6.0-KB4042123-x86.msu

FBD3A01F63A87B8F42DBD89D68F39AE7A844FBA8

CE6C17441D0AF115E20E4AF5A6965E8AAA9522EA0468AE683D8A3E7317F2F20D

Windows6.0-KB4042123-ia64.msu

525CD680BED4FE34CB9A1AE6D58F1333BDF5F400

67743CECAEDA25C9811AA5A2A2B048A07C9E048D39AFC5118C5DC046B9F0C3FE

Windows6.0-KB4042123-x64.msu

D1DB70DF0FC955D91BD8ECCA754171FE05C4B8A0

E19F48A13C6001F76CE5EB993998068D379F93E94684D1A6A890DCCBA0141E85

For all supported x86-based versions

File name

File version

File size

Date

Time

Platform

Msctf.dll

6.0.6002.24202

807,936

13-Sep-2017

15:22

x86

For all supported ia64-based versions

File name

File version

File size

Date

Time

Platform

Msctf.dll

6.0.6002.24202

2,063,360

13-Sep-2017

15:20

IA-64

Msctf.dll

6.0.6002.24202

807,936

13-Sep-2017

15:22

x86

For all supported x64-based versions

File name

File version

File size

Date

Time

Platform

Msctf.dll

6.0.6002.24202

1,040,896

13-Sep-2017

15:22

x64

Msctf.dll

6.0.6002.24202

807,936

13-Sep-2017

15:22

x86

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.

Was this information helpful?

What affected your experience?
By pressing submit, your feedback will be used to improve Microsoft products and services. Your IT admin will be able to collect this data. Privacy Statement.

Thank you for your feedback!

×