Summary
This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if an attacker with access to a domain controller (DC) on a target network runs a specially crafted application to establish a secure channel to the DC as a replica domain controller. Microsoft Security Bulletin MS16-076.
To learn more about the vulnerability, seeMore Information
Important
-
All future security and non-security updates for Windows Server 2012 R2 require update 2919355 to be installed. We recommend that you install update 2919355 on your Windows Server 2012 R2-based computer so that you receive future updates.
-
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
Additional information about this security update
The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.
-
3162343 MS16-076: Description of the security update for Netlogon: June 14, 2016
-
3161561 MS16-075 and MS16-076: Description of the security update for Windows Netlogon and SMB Server: June 14, 2016
Update FAQ
Why is security update 3161561 in this bulletin also denoted in MS16-075 MS16-075 for supported releases of Windows Server 2008, Windows Server 2008 R2, and Windows Server 2012 due to the way fixes for vulnerabilities affecting particular products are consolidated. Because bulletins are broken out by the vulnerabilities being addressed, not by the update package being released, it is possible for separate bulletins, each addressing distinctly different vulnerabilities, to list the same update package as the vehicle for providing their respective fixes. This is frequently the case with cumulative updates for products, such as Internet Explorer or Silverlight, where singular security updates address different security vulnerabilities in separate bulletins. Note Users do not need to install identical security updates that ship with multiple bulletins more than once.
Security update 3161561 is also denoted inHow to obtain and install the update
Method 1: Windows Update
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, seeGet security updates automatically.
You can obtain the stand-alone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update. Microsoft Security Bulletin MS16-076 that corresponds to the version of Windows that you are running.
Click the download link inMore Information
Windows Server 2012 R2 (all editions)Reference Table
The following table contains the security update information for this software.
For all supported editions of Windows Server 2012 R2: Windows8.1-KB3162343-x64.msu |
|
Installation switches |
|
Restart requirement |
A system restart is required after you apply this security update. |
Removal information |
To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, click Windows Update, and then under See also, click Installed updates and select from the list of updates. |
File information |
See Microsoft Knowledge Base Article 3161561 See Microsoft Knowledge Base Article 3162343 |
Registry key verification |
Note A registry key does not exist to validate the presence of this update. |
Help for installing updates: Support for Microsoft Update Security solutions for IT professionals: TechNet Security Troubleshooting and Support Help for protecting your Windows-based computer from viruses and malware: Virus Solution and Security Center Local support according to your country: International Support