[BigFix-Announcements] BES Auto Notification: New Fixlets Published in Fixlet Site: 'Patches for Windows'

autonotify at us.ibm.com autonotify at us.ibm.com
Wed Jul 12 02:04:22 PDT 2017


Fixlet Site - 'Patches for Windows'
Current Version: 2798	Published: Wed, 12 Jul 2017 04:56:21  GMT

New Fixlets:
============

***************************************************************
Title: MS17-JUL: Security update for 2007 Microsoft Office Suite - Office 2007 SP3 - KB2880514
Severity: Important
Fixlet ID: 288051401
Fixlet Link: https://support.microsoft.com/kb/2880514

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-0243. Note To apply this security update, you must have the release version of Service Pack 3 for the 2007 Microsoft Office Suite installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Excel Viewer 2007 - Excel Viewer 2007 SP3 - KB3191833
Severity: Important
Fixlet ID: 319183301
Fixlet Link: https://support.microsoft.com/kb/3191833

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501. Note To apply this security update, you must have the release version of Service Pack 3 for Microsoft Office Excel Viewer 2007 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Excel 2007 - Excel 2007 SP3 - KB3191894
Severity: Important
Fixlet ID: 319189401
Fixlet Link: https://support.microsoft.com/kb/3191894

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501. Note To apply this security update, you must have the release version of Service Pack 3 for the 2007 Microsoft Office Suite installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Microsoft Office Compatibility Pack Service Pack 3 - Office Compatibility Pack SP3 - KB3191897
Severity: Important
Fixlet ID: 319189701
Fixlet Link: https://support.microsoft.com/kb/3191897

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501. Note To apply this security update, you must have the release version of Service Pack 3 for the 2007 Microsoft Office Suite installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Excel Services on SharePoint Server 2010 - SharePoint Server 2010 SP2 - KB3191902 (x64)
Severity: Important
Fixlet ID: 319190201
Fixlet Link: https://support.microsoft.com/kb/3191902

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501. Note To apply this security update, you must have the release version of Service Pack 2 for Microsoft SharePoint Server 2010 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Excel 2010 - Excel 2010 SP2 - KB3191907 (x64)
Severity: Important
Fixlet ID: 319190701
Fixlet Link: https://support.microsoft.com/kb/3191907

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501 and Microsoft Common Vulnerabilities and Exposures CVE-2017-8502. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Excel 2010 - Excel 2010 SP2 - KB3191907
Severity: Important
Fixlet ID: 319190703
Fixlet Link: https://support.microsoft.com/kb/3191907

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501 and Microsoft Common Vulnerabilities and Exposures CVE-2017-8502. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for SharePoint Server 2010 - SharePoint Server 2010 Service Pack 2 - KB3203459 (x64)
Severity: Important
Fixlet ID: 320345901
Fixlet Link: https://support.microsoft.com/kb/3203459

Fixlet Description: A security vulnerability exists in 2010 Microsoft Business Productivity Servers that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability.

***************************************************************
Title: MS17-JUL: Security update for Office 2010 - Office 2010 SP2 - KB3203468 (x64)
Severity: Important
Fixlet ID: 320346801
Fixlet Link: https://support.microsoft.com/kb/3203468

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-0243. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Office 2010 - Office 2010 SP2 - KB3203468
Severity: Important
Fixlet ID: 320346803
Fixlet Link: https://support.microsoft.com/kb/3203468

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-0243. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for SharePoint Server 2010 Office Web Apps - Office Web Apps 2010 SP2 - KB3203469 (x64)
Severity: Important
Fixlet ID: 320346901
Fixlet Link: https://support.microsoft.com/kb/3203469

Fixlet Description: A security vulnerability exists in Microsoft Web Applications that could allow arbitrary code to run when a maliciously modified file is opened. This update resolves that vulnerability.

***************************************************************
Title: MS17-JUL: Security update for Excel 2016 - Excel 2016 - KB3203477 (x64)
Severity: Important
Fixlet ID: 320347701
Fixlet Link: https://support.microsoft.com/kb/3203477

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501 and Microsoft Common Vulnerabilities and Exposures CVE-2017-8502. Note To apply this security update, you must have the release version of Excel 2016 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Excel 2016 - Excel 2016 - KB3203477
Severity: Important
Fixlet ID: 320347703
Fixlet Link: https://support.microsoft.com/kb/3203477

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501 and Microsoft Common Vulnerabilities and Exposures CVE-2017-8502. Note To apply this security update, you must have the release version of Excel 2016 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Excel 2013 - Excel 2013 SP1 - KB3213537 (x64)
Severity: Important
Fixlet ID: 321353701
Fixlet Link: https://support.microsoft.com/kb/3213537

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501 and Microsoft Common Vulnerabilities and Exposures CVE-2017-8502. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Excel 2013 - Excel 2013 SP1 - KB3213537
Severity: Important
Fixlet ID: 321353703
Fixlet Link: https://support.microsoft.com/kb/3213537

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501 and Microsoft Common Vulnerabilities and Exposures CVE-2017-8502. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for SharePoint Server 2016 - SharePoint Server 2016 - KB3213544 (x64)
Severity: Important
Fixlet ID: 321354401
Fixlet Link: https://support.microsoft.com/kb/3213544

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8569. Note To apply this security update, you must have the release version of SharePoint Server 2016 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Office 2016 - Office 2016 - KB3213545 (x64)
Severity: Important
Fixlet ID: 321354501
Fixlet Link: https://support.microsoft.com/kb/3213545

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8570. Note To apply this security update, you must have the release version of Office 2016 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Office 2016 - Office 2016 - KB3213545
Severity: Important
Fixlet ID: 321354503
Fixlet Link: https://support.microsoft.com/kb/3213545

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8570. Note To apply this security update, you must have the release version of Office 2016 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Office 2013 - Office 2013 SP1 - KB3213555 (x64)
Severity: Important
Fixlet ID: 321355501
Fixlet Link: https://support.microsoft.com/kb/3213555

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8570. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Office 2013 - Office 2013 SP1 - KB3213555
Severity: Important
Fixlet ID: 321355503
Fixlet Link: https://support.microsoft.com/kb/3213555

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8570. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft Office 2013 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for SharePoint Server 2013 - SharePoint Server 2013 SP1 - KB3213559 (x64)
Severity: Important
Fixlet ID: 321355901
Fixlet Link: https://support.microsoft.com/kb/3213559

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501. Note To apply this security update, you must have the release version of Service Pack 1 for Microsoft SharePoint Server 2013 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Office 2010 - Office 2010 SP2 - KB3213624 (x64)
Severity: Important
Fixlet ID: 321362401
Fixlet Link: https://support.microsoft.com/kb/3213624

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8570. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Office 2010 - Office 2010 SP2 - KB3213624
Severity: Important
Fixlet ID: 321362403
Fixlet Link: https://support.microsoft.com/kb/3213624

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8570. Note To apply this security update, you must have the release version of Service Pack 2 for Office 2010 installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for 2007 Microsoft Office Suite - Office 2007 SP3 - KB3213640
Severity: Important
Fixlet ID: 321364001
Fixlet Link: https://support.microsoft.com/kb/3213640

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8570. Note To apply this security update, you must have the release version of Service Pack 3 for the 2007 Microsoft Office Suite installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Office Online Server - Office Online Server - KB3213657 (x64)
Severity: Important
Fixlet ID: 321365701
Fixlet Link: https://support.microsoft.com/kb/3213657

Fixlet Description: This security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see Microsoft Common Vulnerabilities and Exposures CVE-2017-8501. Note To apply this security update, you must have the release version of Office Online Server installed on the computer.

***************************************************************
Title: MS17-JUL: Security update for Microsoft Exchange - Exchange Server 2010 SP3 - KB4018588 (x64)
Severity: Moderate
Fixlet ID: 401858801
Fixlet Link: https://support.microsoft.com/kb/4018588

Fixlet Description: Update Rollup 18 For Exchange 2010 SP3 (KB4018588)

***************************************************************
Title: MS17-JUL: Security update for Microsoft Exchange - Exchange Server 2013 SP1 - KB4018588 (x64)
Severity: Important
Fixlet ID: 401858803
Fixlet Link: https://support.microsoft.com/kb/4018588

Fixlet Description: Security Update For Exchange Server 2013 SP1 (KB4018588)

***************************************************************
Title: MS17-JUL: Security update for Microsoft Exchange - Exchange Server 2013 CU16 - KB4018588 (x64)
Severity: Important
Fixlet ID: 401858805
Fixlet Link: https://support.microsoft.com/kb/4018588

Fixlet Description: Security Update For Exchange Server 2013 CU16 (KB4018588)

***************************************************************
Title: MS17-JUL: Security update for Microsoft Exchange - Exchange Server 2016 CU5 - KB4018588 (x64)
Severity: Important
Fixlet ID: 401858807
Fixlet Link: https://support.microsoft.com/kb/4018588

Fixlet Description: Security Update For Exchange Server 2016 CU5 (KB4018588)

***************************************************************
Title: MS17-JUL: Security update for the Kerberos SNAME security feature bypass vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4022746 (x64)
Severity: Important
Fixlet ID: 402274601
Fixlet Link: https://support.microsoft.com/kb/4022746

Fixlet Description: A security feature bypass vulnerability exists in Microsoft Windows when Kerberos fails to prevent tampering with the SNAME field during ticket exchange. An attacker who successfully exploited this vulnerability could use it to bypass Extended Protection for Authentication. To learn more about the vulnerability, go to  CVE-2017-8495.

***************************************************************
Title: MS17-JUL: Security update for the Kerberos SNAME security feature bypass vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4022746
Severity: Important
Fixlet ID: 402274603
Fixlet Link: https://support.microsoft.com/kb/4022746

Fixlet Description: A security feature bypass vulnerability exists in Microsoft Windows when Kerberos fails to prevent tampering with the SNAME field during ticket exchange. An attacker who successfully exploited this vulnerability could use it to bypass Extended Protection for Authentication. To learn more about the vulnerability, go to  CVE-2017-8495.

***************************************************************
Title: MS17-JUL: Security update for the Windows kernel information disclosure vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4022748 (x64)
Severity: Important
Fixlet ID: 402274801
Fixlet Link: https://support.microsoft.com/kb/4022748

Fixlet Description: An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. To learn more about the vulnerability, go to  CVE-2017-8564.

***************************************************************
Title: MS17-JUL: Security update for the Windows kernel information disclosure vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4022748
Severity: Important
Fixlet ID: 402274803
Fixlet Link: https://support.microsoft.com/kb/4022748

Fixlet Description: An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, allowing an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. To learn more about the vulnerability, go to  CVE-2017-8564.

***************************************************************
Title: MS17-JUL: Security update for the Windows kernel information disclosure vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4022914 (x64)
Severity: Important
Fixlet ID: 402291401
Fixlet Link: https://support.microsoft.com/kb/4022914

Fixlet Description: An information disclosure vulnerability exists when the HTTP.sys server application component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the HTTP.sys server application system. To learn more about the vulnerability, go to  CVE-2017-8582.

***************************************************************
Title: MS17-JUL: Security update for the Windows kernel information disclosure vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4022914
Severity: Important
Fixlet ID: 402291403
Fixlet Link: https://support.microsoft.com/kb/4022914

Fixlet Description: An information disclosure vulnerability exists when the HTTP.sys server application component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the HTTP.sys server application system. To learn more about the vulnerability, go to  CVE-2017-8582.

***************************************************************
Title: MS17-JUL: Security update for the Microsoft browser security feature bypass vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025240 (x64)
Severity: Important
Fixlet ID: 402524001
Fixlet Link: https://support.microsoft.com/kb/4025240

Fixlet Description: A security feature bypass vulnerability exists when Microsoft browsers improperly handle redirect requests. This vulnerability allows Microsoft browsers to bypass CORS redirect restrictions and follow redirect requests that should otherwise be ignored. An attacker who successfully exploited this vulnerability could force the browser to send data that would otherwise be restricted to a destination web site of their choice. To learn more about the vulnerability, go to  CVE-2017-8592.

***************************************************************
Title: MS17-JUL: Security update for the Microsoft browser security feature bypass vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025240
Severity: Important
Fixlet ID: 402524003
Fixlet Link: https://support.microsoft.com/kb/4025240

Fixlet Description: A security feature bypass vulnerability exists when Microsoft browsers improperly handle redirect requests. This vulnerability allows Microsoft browsers to bypass CORS redirect restrictions and follow redirect requests that should otherwise be ignored. An attacker who successfully exploited this vulnerability could force the browser to send data that would otherwise be restricted to a destination web site of their choice. To learn more about the vulnerability, go to  CVE-2017-8592.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows Server 2008 R2 SP1 - IE 11 - KB4025252 (x64)
Severity: Moderate
Fixlet ID: 402525201
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows 7 SP1 - IE 11 - KB4025252 (x64)
Severity: Critical
Fixlet ID: 402525203
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows 7 SP1 - IE 11 - KB4025252
Severity: Critical
Fixlet ID: 402525205
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB4025252 (x64)
Severity: Moderate
Fixlet ID: 402525207
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows Server 2008 SP2 - IE 9 - KB4025252
Severity: Moderate
Fixlet ID: 402525209
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows Server 2012 - IE 10 - KB4025252 (x64)
Severity: Moderate
Fixlet ID: 402525211
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows Server 2012 R2 - IE 11 - KB4025252 (x64)
Severity: Moderate
Fixlet ID: 402525213
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows 8.1 - IE 11 - KB4025252 (x64)
Severity: Critical
Fixlet ID: 402525215
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Cumulative security update for Internet Explorer - Windows 8.1 - IE 11 - KB4025252
Severity: Critical
Fixlet ID: 402525217
Fixlet Link: https://support.microsoft.com/kb/4025252

Fixlet Description: This security update resolves several reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage in Internet Explorer. To learn more about these vulnerabilities, see The Security Update Guide. This security update includes improvements and fixes that resolve the following issues: Addressed issue introduced by KB 4032782 where Internet Explorer may close unexpectedly when you visit some websites. Addressed issue in Internet Explorer 11 where a text node returned from the DOMParser may be incorrect when MutationObserver for childList and subtree is active. Addressed issue in Internet Explorer 11 where a crash can occur in limited scenarios when using the Find feature (Ctrl-F). Addressed issue where the onhashchange event fails to trigger when navigating some hashed URLs in Internet Explorer 11. Addressed issue where the NewWindow3 event handler is never called in a managed WebBrowser class of .NET 4.6. Addressed issue that can cause cursor flicker when hovering over a pop-up menu option in Internet Explorer 11 and Microsoft Edge. Addressed issue where Internet Explorer 11 crashes when a user clicks an empty column header and then quickly does a Shift + double click. Addressed issue where Internet Explorer 11 crashes with certain Browser Helper Objects after the July Internet Explorer updates. Addressed issue where certain elements (input or select) cannot be active targets of any action in Internet Explorer 11. This occurs after removing an iframe that contained a cursor inside certain elements (input or select) and adding a new iframe. Security updates to Internet Explorer. Additionally, see the following articles for more information about this cumulative update: Windows 7 SP1 and Windows Server 2008 R2 SP1 update history Windows Server 2012 update history Windows 8.1 and Windows Server 2012 R2 update history Windows 10 and Windows Server 2016 update history Important The fixes included in this Security Update for Internet Explorer 4025252 are also included in the July 2017 Security Monthly Quality Rollup. Installing either the Security Update for Internet Explorer or the Security Monthly Quality Rollup installs the fixes that are resolved in this update. If you use update management processes other than Windows Update and you automatically approve all security updates classifications for deployment, this Security Update for Internet Explorer 4025252, the July 2017 Security Only Quality Update, and the July 2017 Security Monthly Quality Rollup are deployed. We recommend that you review your update deployment rules to make sure the desired updates are deployed. This Security Update for Internet Explorer is not applicable for installation on a computer where the Security Monthly Quality Rollup or the Preview of Monthly Quality Rollup from July 2017 (or a later month) is already installed. This is because those updates contain all fixes in this Security Update for Internet Explorer. If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

***************************************************************
Title: MS17-JUL: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 - KB4025331 (x64)
Severity: Critical
Fixlet ID: 402533101
Fixlet Link: https://support.microsoft.com/kb/4025331

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security Only Quality Update - Security Only - Windows Server 2012 R2 - KB4025333 (x64)
Severity: Critical
Fixlet ID: 402533301
Fixlet Link: https://support.microsoft.com/kb/4025333

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Security Only Quality Update - Security Only - Windows 8.1 - KB4025333 (x64)
Severity: Critical
Fixlet ID: 402533303
Fixlet Link: https://support.microsoft.com/kb/4025333

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Security Only Quality Update - Security Only - Windows 8.1 - KB4025333
Severity: Critical
Fixlet ID: 402533305
Fixlet Link: https://support.microsoft.com/kb/4025333

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - KB4025336 (x64)
Severity: Critical
Fixlet ID: 402533601
Fixlet Link: https://support.microsoft.com/kb/4025336

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2012 R2 - KB4025336 (x64)
Severity: Critical
Fixlet ID: 402533603
Fixlet Link: https://support.microsoft.com/kb/4025336

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Security Monthly Quality Rollup - Monthly Rollup - Windows 8.1 - KB4025336
Severity: Critical
Fixlet ID: 402533605
Fixlet Link: https://support.microsoft.com/kb/4025336

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Security Only Quality Update - Security Only - Windows Server 2008 R2 SP1 - KB4025337 (x64)
Severity: Critical
Fixlet ID: 402533701
Fixlet Link: https://support.microsoft.com/kb/4025337

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security Only Quality Update - Security Only - Windows 7 SP1 - KB4025337 (x64)
Severity: Critical
Fixlet ID: 402533703
Fixlet Link: https://support.microsoft.com/kb/4025337

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security Only Quality Update - Security Only - Windows 7 SP1 - KB4025337
Severity: Critical
Fixlet ID: 402533705
Fixlet Link: https://support.microsoft.com/kb/4025337

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 - KB4025338 (x64)
Severity: Critical
Fixlet ID: 402533801
Fixlet Link: https://support.microsoft.com/kb/4025338

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows 10 Version 1507 - Windows 10 Version 1507 - KB4025338
Severity: Critical
Fixlet ID: 402533803
Fixlet Link: https://support.microsoft.com/kb/4025338

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB4025339 (x64)
Severity: Critical
Fixlet ID: 402533901
Fixlet Link: https://support.microsoft.com/kb/4025339

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows Server 2016 - Windows Server 2016 - KB4025339 (x64)
Severity: Moderate
Fixlet ID: 402533903
Fixlet Link: https://support.microsoft.com/kb/4025339

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Delta Update for Windows Server 2016 - Windows Server 2016 - Delta Update - KB4025339 (x64)
Severity: Moderate
Fixlet ID: 402533905
Fixlet Link: https://support.microsoft.com/kb/4025339

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Delta Update for Windows 10 Version 1607 - Windows 10 Version 1607 - Delta Update - KB4025339 (x64)
Severity: Critical
Fixlet ID: 402533907
Fixlet Link: https://support.microsoft.com/kb/4025339

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows 10 Version 1607 - Windows 10 Version 1607 - KB4025339
Severity: Critical
Fixlet ID: 402533909
Fixlet Link: https://support.microsoft.com/kb/4025339

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Delta Update for Windows 10 Version 1607 - Windows 10 Version 1607 - Delta Update - KB4025339
Severity: Critical
Fixlet ID: 402533911
Fixlet Link: https://support.microsoft.com/kb/4025339

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Security Monthly Quality Rollup - Monthly Rollup - Windows Server 2008 R2 SP1 - KB4025341 (x64)
Severity: Critical
Fixlet ID: 402534101
Fixlet Link: https://support.microsoft.com/kb/4025341

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - KB4025341 (x64)
Severity: Critical
Fixlet ID: 402534103
Fixlet Link: https://support.microsoft.com/kb/4025341

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security Monthly Quality Rollup - Monthly Rollup - Windows 7 SP1 - KB4025341
Severity: Critical
Fixlet ID: 402534105
Fixlet Link: https://support.microsoft.com/kb/4025341

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows 10 Version 1703 - Windows 10 Version 1703 - KB4025342
Severity: Critical
Fixlet ID: 402534201
Fixlet Link: https://support.microsoft.com/kb/4025342

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows 10 Version 1703 - Windows 10 Version 1703 - KB4025342 (x64)
Severity: Critical
Fixlet ID: 402534203
Fixlet Link: https://support.microsoft.com/kb/4025342

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Delta Update for Windows 10 Version 1703 - Windows 10 Version 1703 - Delta Update - KB4025342 (x64)
Severity: Critical
Fixlet ID: 402534205
Fixlet Link: https://support.microsoft.com/kb/4025342

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Delta Update for Windows 10 Version 1703 - Windows 10 Version 1703 - Delta Update - KB4025342
Severity: Critical
Fixlet ID: 402534207
Fixlet Link: https://support.microsoft.com/kb/4025342

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system. 

Important Note: There are known issues associated with the installation of this update. See the Known Issues section of the Knowledge Base Article for more information.

***************************************************************
Title: MS17-JUL: Security Only Quality Update - Security Only - Windows Server 2012 - KB4025343 (x64)
Severity: Critical
Fixlet ID: 402534301
Fixlet Link: https://support.microsoft.com/kb/4025343

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows 10 Version 1511 - Windows 10 Version 1511 - KB4025344 (x64)
Severity: Critical
Fixlet ID: 402534401
Fixlet Link: https://support.microsoft.com/kb/4025344

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Cumulative Update for Windows 10 Version 1511 - Windows 10 Version 1511 - KB4025344
Severity: Critical
Fixlet ID: 402534403
Fixlet Link: https://support.microsoft.com/kb/4025344

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security update for Adobe Flash Player - Windows Server 2012 - Adobe Flash Player - KB4025376 (x64)
Severity: Critical
Fixlet ID: 402537601
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security update for Adobe Flash Player - Windows Server 2012 R2 - Adobe Flash Player - KB4025376 (x64)
Severity: Critical
Fixlet ID: 402537603
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security update for Adobe Flash Player - Windows 8.1 - Adobe Flash Player - KB4025376 (x64)
Severity: Critical
Fixlet ID: 402537605
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security update for Adobe Flash Player - Windows 8.1 - Adobe Flash Player - KB4025376
Severity: Critical
Fixlet ID: 402537607
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows 10 Version 1507 - Windows 10 Version 1507 - Adobe Flash Player - KB4025376 (x64)
Severity: Critical
Fixlet ID: 402537609
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows Server 2016 - Windows Server 2016 - Adobe Flash Player - KB4025376 (x64)
Severity: Critical
Fixlet ID: 402537611
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows 10 Version 1607 - Windows 10 Version 1607 - Adobe Flash Player - KB4025376 (x64)
Severity: Critical
Fixlet ID: 402537613
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows 10 Version 1511 - Windows 10 Version 1511 - Adobe Flash Player - KB4025376 (x64)
Severity: Critical
Fixlet ID: 402537615
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows 10 Version 1607 - Windows 10 Version 1607 - Adobe Flash Player - KB4025376
Severity: Critical
Fixlet ID: 402537617
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows 10 Version 1507 - Windows 10 Version 1507 - Adobe Flash Player - KB4025376
Severity: Critical
Fixlet ID: 402537619
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows 10 Version 1511 - Windows 10 Version 1511 - Adobe Flash Player - KB4025376
Severity: Critical
Fixlet ID: 402537621
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: This security update resolves vulnerabilities in Adobe Flash Player if it's installed on any supported edition of Windows Server 2016, Windows Server 2012 R2, Windows Server 2012, Windows 10, Windows 10 Version 1511, Windows 10 Version 1607, Windows 10 Version 1703, Windows 8.1, or Windows RT 8.1. To learn more about the vulnerability, see ADV170009.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows 10 Version 1703 - Windows 10 Version 1703 - Adobe Flash Player - KB4025376 (x64)
Severity: Critical
Fixlet ID: 402537623
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security Update for Adobe Flash Player for Windows 10 Version 1703 - Windows 10 Version 1703 - Adobe Flash Player - KB4025376
Severity: Critical
Fixlet ID: 402537625
Fixlet Link: https://support.microsoft.com/kb/4025376

Fixlet Description: A security issue has been identified in a Microsoft software product that could affect your system. You can help protect your system by installing this update from Microsoft. For a complete listing of the issues that are included in this update, see the associated Microsoft Knowledge Base article. After you install this update, you may have to restart your system.

***************************************************************
Title: MS17-JUL: Security update for the Windows Performance Monitor information disclosure vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025397 (x64)
Severity: Moderate
Fixlet ID: 402539701
Fixlet Link: https://support.microsoft.com/kb/4025397

Fixlet Description: An information disclosure vulnerability exists in the Windows Performance Monitor Console when it improperly parses XML input containing a reference to an external entity. To learn more about the vulnerability, go to  CVE-2017-0170.

***************************************************************
Title: MS17-JUL: Security update for the Windows Performance Monitor information disclosure vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025397
Severity: Moderate
Fixlet ID: 402539703
Fixlet Link: https://support.microsoft.com/kb/4025397

Fixlet Description: An information disclosure vulnerability exists in the Windows Performance Monitor Console when it improperly parses XML input containing a reference to an external entity. To learn more about the vulnerability, go to  CVE-2017-0170.

***************************************************************
Title: MS17-JUL: Security update for the MSINFO.Exe information disclosure vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025398 (x64)
Severity: Important
Fixlet ID: 402539801
Fixlet Link: https://support.microsoft.com/kb/4025398

Fixlet Description: An information disclosure vulnerability exists in the Windows System Information Console when it improperly parses XML input that contains a reference to an external entity. To learn more about the vulnerability, see CVE-2017-8557.

***************************************************************
Title: MS17-JUL: Security update for the MSINFO.Exe information disclosure vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025398
Severity: Important
Fixlet ID: 402539803
Fixlet Link: https://support.microsoft.com/kb/4025398

Fixlet Description: An information disclosure vulnerability exists in the Windows System Information Console when it improperly parses XML input that contains a reference to an external entity. To learn more about the vulnerability, see CVE-2017-8557.

***************************************************************
Title: MS17-JUL: Security update for the Windows elevation of privilege vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025409 (x64)
Severity: Important
Fixlet ID: 402540901
Fixlet Link: https://support.microsoft.com/kb/4025409

Fixlet Description: An elevation of privilege vulnerability exists in Microsoft Windows when Kerberos falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol. To learn more about the vulnerability, see  CVE-2017-8563.

***************************************************************
Title: MS17-JUL: Security update for the Windows elevation of privilege vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025409
Severity: Important
Fixlet ID: 402540903
Fixlet Link: https://support.microsoft.com/kb/4025409

Fixlet Description: An elevation of privilege vulnerability exists in Microsoft Windows when Kerberos falls back to NT LAN Manager (NTLM) Authentication Protocol as the default authentication protocol. To learn more about the vulnerability, see  CVE-2017-8563.

***************************************************************
Title: MS17-JUL: Security update for the Windows Explorer remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025497 (x64)
Severity: Critical
Fixlet ID: 402549701
Fixlet Link: https://support.microsoft.com/kb/4025497

Fixlet Description: A remote code execution vulnerability exists when Windows Explorer improperly handles executable files and shares during rename operations. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another user. Users not running as administrators would be less affected. To learn more about the vulnerability, go to  CVE-2017-8463.

***************************************************************
Title: MS17-JUL: Security update for the Windows Explorer remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025497
Severity: Critical
Fixlet ID: 402549703
Fixlet Link: https://support.microsoft.com/kb/4025497

Fixlet Description: A remote code execution vulnerability exists when Windows Explorer improperly handles executable files and shares during rename operations. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of another user. Users not running as administrators would be less affected. To learn more about the vulnerability, go to  CVE-2017-8463.

***************************************************************
Title: MS17-JUL: Security update for the Windows Explorer denial of service vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025674 (x64)
Severity: Important
Fixlet ID: 402567401
Fixlet Link: https://support.microsoft.com/kb/4025674

Fixlet Description: An denial of service vulnerability exists when Windows Explorer attempts to open a non-existent file. An attacker who successfully exploited this vulnerability could cause a denial of service. To learn more about the vulnerability, go to  CVE-2017-8587.

***************************************************************
Title: MS17-JUL: Security update for the Windows Explorer denial of service vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025674
Severity: Important
Fixlet ID: 402567403
Fixlet Link: https://support.microsoft.com/kb/4025674

Fixlet Description: An denial of service vulnerability exists when Windows Explorer attempts to open a non-existent file. An attacker who successfully exploited this vulnerability could cause a denial of service. To learn more about the vulnerability, go to  CVE-2017-8587.

***************************************************************
Title: MS17-JUL: Security update for the Windows PowerShell remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025872 (x64)
Severity: Important
Fixlet ID: 402587201
Fixlet Link: https://support.microsoft.com/kb/4025872

Fixlet Description: A remote code execution vulnerability exists in PowerShell when PSObject wraps a CIM Instance. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system. To learn more about the vulnerability, see  CVE-2017-8565.

***************************************************************
Title: MS17-JUL: Security update for the Windows PowerShell remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4025872
Severity: Important
Fixlet ID: 402587203
Fixlet Link: https://support.microsoft.com/kb/4025872

Fixlet Description: A remote code execution vulnerability exists in PowerShell when PSObject wraps a CIM Instance. An attacker who successfully exploited this vulnerability could execute malicious code on a vulnerable system. To learn more about the vulnerability, see  CVE-2017-8565.

***************************************************************
Title: MS17-JUL: Security update for Windows Server 2008 - Windows Server 2008 SP2 - KB4025877 (x64)
Severity: Important
Fixlet ID: 402587701
Fixlet Link: https://support.microsoft.com/kb/4025877

Fixlet Description: This security update resolves vulnerabilities in Windows Server 2008 that could allow elevation of privilege or information disclosure. To learn more about the vulnerabilities, go to the  Security Update Guide.

***************************************************************
Title: MS17-JUL: Security update for Windows Server 2008 - Windows Server 2008 SP2 - KB4025877
Severity: Important
Fixlet ID: 402587703
Fixlet Link: https://support.microsoft.com/kb/4025877

Fixlet Description: This security update resolves vulnerabilities in Windows Server 2008 that could allow elevation of privilege or information disclosure. To learn more about the vulnerabilities, go to the  Security Update Guide.

***************************************************************
Title: MS17-JUL: Security update for the Windows CLFS elevation of privilege vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4026059 (x64)
Severity: Important
Fixlet ID: 402605901
Fixlet Link: https://support.microsoft.com/kb/4026059

Fixlet Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. To learn more about the vulnerability, see CVE-2017-8590.

***************************************************************
Title: MS17-JUL: Security update for the Windows CLFS elevation of privilege vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4026059
Severity: Important
Fixlet ID: 402605903
Fixlet Link: https://support.microsoft.com/kb/4026059

Fixlet Description: An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. To learn more about the vulnerability, see CVE-2017-8590.

***************************************************************
Title: MS17-JUL: Security update for the WordPad remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4026061 (x64)
Severity: Important
Fixlet ID: 402606101
Fixlet Link: https://support.microsoft.com/kb/4026061

Fixlet Description: A remote code execution vulnerability exists in the way that Microsoft WordPad parses specially crafted files. To learn more about the vulnerability, see  CVE-2017-8588.

***************************************************************
Title: MS17-JUL: Security update for the WordPad remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4026061
Severity: Important
Fixlet ID: 402606103
Fixlet Link: https://support.microsoft.com/kb/4026061

Fixlet Description: A remote code execution vulnerability exists in the way that Microsoft WordPad parses specially crafted files. To learn more about the vulnerability, see  CVE-2017-8588.

***************************************************************
Title: MS17-JUL: Security update for the Windows Search remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4032955 (x64)
Severity: Critical
Fixlet ID: 403295501
Fixlet Link: https://support.microsoft.com/kb/4032955

Fixlet Description: A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To learn more about the vulnerability, go to  CVE-2017-8589.

***************************************************************
Title: MS17-JUL: Security update for the Windows Search remote code execution vulnerability in Windows Server 2008 - Windows Server 2008 SP2 - KB4032955
Severity: Critical
Fixlet ID: 403295503
Fixlet Link: https://support.microsoft.com/kb/4032955

Fixlet Description: A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To learn more about the vulnerability, go to  CVE-2017-8589.

***************************************************************
Title: MS17-JUL: Use the LdapEnforceChannelBinding registry entry to make LDAP authentication over SSL/TLS more secure - Windows Server 2008 SP2 / 2008 R2 SP1 / 2012 / 2012 R2 / 2016 - KB4034879
Severity: Unspecified
Fixlet ID: 403487909
Fixlet Link: https://support.microsoft.com/kb/4034879

Fixlet Description: CVE-2017-8563 introduces a registry setting that administrators can use to help make LDAP authentication over SSL/TLS more secure.



More information about the BigFix-Announcements mailing list