Summary

An denial of service vulnerability exists when Windows Explorer attempts to open a non-existent file. An attacker who successfully exploited this vulnerability could cause a denial of service.

To learn more about the vulnerability, go to CVE-2017-8587.

More Information

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

Security update deployment information: July 11, 2017

More Information


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

Windows Server 2008 file information

Note: The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

How to obtain help and support for this security update

Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

File Information

File hash information

File name

SHA1 hash

SHA256 hash

Windows6.0-KB4025674-ia64.msu

D02E63F3EBD2CBEC89D2A1C1479722F578B0C337

DA10DCBB8489048758C020745027D4DFDBBD444C5C9343E09FB0C0F1969E04CB

Windows6.0-KB4025674-x64.msu

113EFA5223009A54001E21420B6E30906373CEE5

17284138C95F7E7EB148A7E2989816CD15EF1ECC0A7CB0A69D09E30D9FE9C609

Windows6.0-KB4025674-x86.msu

7CA3BD6CC38E083DF5B31B2CD178AAF3D4057EAD

00255C0F5F23E4FDC569769F5F257C4D834BF8E9B14B3E8606451F87E02D6BFC

For all supported ia64-based versions

File name

File version

File size

Date

Time

Platform

Ntfs.sys

6.0.6002.19816

3,282,152

23-Jun-2017

16:10

IA-64

Ntfs.sys

6.0.6002.24136

3,286,760

23-Jun-2017

15:38

IA-64

For all supported x64-based versions

File name

File version

File size

Date

Time

Platform

Ntfs.sys

6.0.6002.19816

1,511,144

23-Jun-2017

16:45

x64

Ntfs.sys

6.0.6002.24136

1,497,320

23-Jun-2017

16:06

x64

For all supported x86-based versions

File name

File version

File size

Date

Time

Platform

Ntfs.sys

6.0.6002.19816

1,082,088

23-Jun-2017

16:31

x86

Ntfs.sys

6.0.6002.24136

1,083,112

23-Jun-2017

15:45

x86

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×