Microsoft Security Bulletin MS14-052 - Critical
Cumulative Security Update for Internet Explorer (2977629)
Published: September 9, 2014 | Updated: December 19, 2014
Version: 1.1
General Information
Executive Summary
This security update resolves one publicly disclosed and thirty-six privately reported vulnerabilities in Internet Explorer. The most severe of these vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
This security update is rated Critical for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 6 (IE 6), Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers. For more information, see the Affected and Non-Affected Software section.
The security update addresses the vulnerabilities by modifying the way that Internet Explorer handles objects in memory, and by adding additional permission validations to Internet Explorer. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry later in this bulletin.
Recommendation. Most customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871. For customers who do not have automatic updating enabled, the steps in Turn automatic updating on or off can be used to enable automatic updating.
For enterprise installations, or administrators and end users who want to install this security update manually (including customers who have not enabled automatic updating), Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service. The updates are also available via the download links in the Affected Software table in this bulletin.
For additional guidance, see the Detection and Deployment Tools and Guidance section in this bulletin.
Knowledge Base Article
- Knowledge Base Article: 2977629
- File Information: Yes
- SHA1/SHA2 hashes: Yes
- Known issues: Yes
Affected and Non-Affected Software
The following software has been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
Affected Software
Operating System | Component | Maximum Security Impact | Aggregate Severity Rating | Updates Replaced |
---|---|---|---|---|
**Internet Explorer 6** | ||||
Windows Server 2003 Service Pack 2 | [Internet Explorer 6](https://www.microsoft.com/download/details.aspx?familyid=73ca72ba-6660-407b-906a-f73cf69a4afc) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2003 x64 Edition Service Pack 2 | [Internet Explorer 6](https://www.microsoft.com/download/details.aspx?familyid=edc7f51c-6c68-4c89-a29a-c408eee95019) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2003 with SP2 for Itanium-based Systems | [Internet Explorer 6](https://www.microsoft.com/download/details.aspx?familyid=0b7af14e-e8b8-459e-9f6e-98c646507313) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
**Internet Explorer 7** | ||||
Windows Server 2003 Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=3dd813bd-11da-4d9c-b09d-b5236f9fe2e1) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2003 x64 Edition Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=a90838a2-6cfe-42fc-87df-8633b747c5d9) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2003 with SP2 for Itanium-based Systems | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=20a530f2-7dfc-4996-8f7e-1b7c07bf207b) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Vista Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=e5988001-d093-47e7-bd19-be5160f91b83) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Vista x64 Edition Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=75e51906-8ad7-44c2-a750-cf53bea2bd33) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 for 32-bit Systems Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=434d834c-6482-4917-b30b-a2a2d58eb9b8) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 for x64-based Systems Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=d2d3cda3-e627-4ceb-8634-7ce8a80f1857) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 for Itanium-based Systems Service Pack 2 | [Internet Explorer 7](https://www.microsoft.com/download/details.aspx?familyid=9e08e823-0b81-40e5-8280-9d4aacfe27b7) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
**Internet Explorer 8** | ||||
Windows Server 2003 Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=1611d668-d05b-472b-b321-e9c01ffb0c16) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2003 x64 Edition Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=d80d93bf-eb0b-47fe-a7e7-e0c946b58c83) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Vista Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=9b30e101-0d4f-4e37-9766-145f19534c2f) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Vista x64 Edition Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=8a11242b-fbba-4df4-b58d-ddb2f0a7394c) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 for 32-bit Systems Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=c7ec208a-2c89-446b-a96a-e0bcb0b9c039) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 for x64-based Systems Service Pack 2 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=3e594f5d-7bcb-46f1-8eb6-a3ded46557c9) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows 7 for 32-bit Systems Service Pack 1 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=44d00724-84b0-4def-a7c6-315fc17736e9) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows 7 for x64-based Systems Service Pack 1 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=13fafec5-880f-47fe-9adf-7a76e319f84d) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=44d22214-9549-4d47-950a-b7d4d30d2473) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 R2 for Itanium-based Systems Service Pack 1 | [Internet Explorer 8](https://www.microsoft.com/download/details.aspx?familyid=760dae91-e0f4-407c-aea6-cb7b8d7dbae8) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
**Internet Explorer 9** | ||||
Windows Vista Service Pack 2 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=dbe758a7-b720-4155-9bee-04aad0343d6e) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Vista x64 Edition Service Pack 2 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=e5af2769-859d-4f68-8bb7-9977293cbcf4) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 for 32-bit Systems Service Pack 2 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=020726bf-56d7-43c1-9f42-4e84196a1132) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 for x64-based Systems Service Pack 2 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=6ca9a876-cf8f-4cdf-8f97-3e1e1dcaf555) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows 7 for 32-bit Systems Service Pack 1 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=dc7f0d67-dd86-4ada-931a-395ed4f13400) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows 7 for x64-based Systems Service Pack 1 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=392340b1-6c1c-4247-b7a7-ac9ab5a8f5d2) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | [Internet Explorer 9](https://www.microsoft.com/download/details.aspx?familyid=b228262c-50ae-4dba-9cfa-5b2d36aef45f) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
**Internet Explorer 10** | ||||
Windows 7 for 32-bit Systems Service Pack 1 | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=25b9735d-9df0-477b-a34f-90c62d2f9c33) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows 7 for x64-based Systems Service Pack 1 | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=0062d37f-5dc4-44e5-994a-0ac37358fd7b) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=d050a400-d503-49e8-9033-81b452060d7c) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows 8 for 32-bit Systems | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=6dd6cf43-aa7f-48e8-ada3-053e1cfaac70) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows 8 for x64-based Systems | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=6e9de779-07ec-480f-bd66-062ae8564d2b) (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows Server 2012 | [Internet Explorer 10](https://www.microsoft.com/download/details.aspx?familyid=2f600cfb-9abb-498f-9504-e3b5ac9cf540) (2977629) | Remote Code Execution | Moderate | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
Windows RT | Internet Explorer 10[1] (2977629) | Remote Code Execution | Critical | 2976627 in [MS14-051](http://go.microsoft.com/fwlink/?linkid=507027) |
**Internet Explorer 11** | ||||
Windows 7 for 32-bit Systems Service Pack 1 | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=9fd3d4a6-786b-4879-8eab-42c4d9abaa5c) [2] (2977629) | Remote Code Execution | Critical | 2962872 in [MS14-037](http://go.microsoft.com/fwlink/?linkid=402324) |
Windows 7 for x64-based Systems Service Pack 1 | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=efe9d46c-0a8f-43d4-9c6f-40d49e9c736a) [2] (2977629) | Remote Code Execution | Critical | 2962872 in [MS14-037](http://go.microsoft.com/fwlink/?linkid=402324) |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=2efaeda5-4605-4525-b48d-f4121905082e) [2] (2977629) | Remote Code Execution | Moderate | 2962872 in [MS14-037](http://go.microsoft.com/fwlink/?linkid=402324) |
Windows 8.1 for 32-bit Systems | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=35a3003a-2762-4246-822a-28eedbbf6644) [3] (2977629) | Remote Code Execution | Critical | 2962872 in [MS14-037](http://go.microsoft.com/fwlink/?linkid=402324) |
Windows 8.1 for x64-based Systems | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=2db255bb-3d63-4db2-8436-fb4e28f87480) [3] (2977629) | Remote Code Execution | Critical | 2962872 in [MS14-037](http://go.microsoft.com/fwlink/?linkid=402324) |
Windows Server 2012 R2 | [Internet Explorer 11](https://www.microsoft.com/download/details.aspx?familyid=a102b48a-5a53-4373-9725-78424ca022bc) [3] (2977629) | Remote Code Execution | Moderate | 2962872 in [MS14-037](http://go.microsoft.com/fwlink/?linkid=402324) |
Windows RT 8.1 | Internet Explorer 11[1][3] (2977629) | Remote Code Execution | Critical | 2962872 in [MS14-037](http://go.microsoft.com/fwlink/?linkid=402324) |
[2]This update is for systems that have the 2929437 update installed. See the Update FAQ for more information.
[3]This update is for systems that have the 2919355 update installed. See the Update FAQ for more information.
Non-Applicable Software
Operating System | Component |
---|---|
**Server Core installation** | |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Not applicable |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Not applicable |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Not applicable |
Windows Server 2012 (Server Core installation) | Not applicable |
Windows Server 2012 R2 (Server Core installation) | Not applicable |
Update FAQ
I am running Internet Explorer 11 on Windows 8.1, Windows Server 2012 R2, or Windows RT 8.1. Why am I not being offered the 2977629 update?
To be offered any security updates on Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2, the 2919355 update must be installed on the system. For more information, see Microsoft Knowledge Base Article 2919355.
I am running Internet Explorer 11 on Windows 7 or Windows Server 2008 R2. Why am I not being offered the 2977629 update?
To be offered any security updates for Internet Explorer 11 on Windows 7 or Windows Server 2008 R2, update 2929437 must be installed on the system. For more information, see Microsoft Knowledge Base Article 2929437.
For Internet Explorer 11 are there any prerequisites for the 2977629 update?
Yes. Customers running Windows 8.1, Windows Server 2012 R2, or Windows RT 8.1 must first install the 2919355 update released in April, 2014 before installing the 2977629 update. For more information about the prerequisite update, see Microsoft Knowledge Base Article 2919355.
Customers running Internet Explorer 11 on Windows 7 or Windows Server 2008 R2, must first install the 2929437 update released in April, 2014 before installing the 2977629 update. For more information about this prerequisite update, see Microsoft Knowledge Base Article 2929437.
How are Server Core installations affected by the vulnerabilities addressed in this bulletin?
The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, or Windows Server 2012 R2 as indicated in the Non-Applicable Software table, when installed using the Server Core installation option. For more information on this installation option, see the TechNet articles, Managing a Server Core Installation: Overview, Servicing a Server Core Installation, and Server Core and Full Server Integration Overview.
Does this update contain any additional security-related changes?
Yes. In addition to the changes that are listed for the vulnerabilities described in this bulletin, this update includes defense-in-depth updates to the Internet Explorer XSS Filter to help improve security-related features.
What is defense-in-depth?
In information security, defense-in-depth refers to an approach in which multiple layers of defense are in place to help prevent attackers from compromising the security of a network or system.
I am using an older release of the software discussed in this security bulletin. What should I do?
The affected software listed in this bulletin has been tested to determine which releases are affected. Other releases are past their support life cycle. For more information about the product lifecycle, see the Microsoft Support Lifecycle website.
It should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities. To determine the support lifecycle for your software release, see Select a Product for Lifecycle Information. For more information about service packs for these software releases, see Service Pack Lifecycle Support Policy.
Customers who require custom support for older software must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, see the Microsoft Worldwide Information website, select the country in the Contact Information list, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. For more information, see the Microsoft Support Lifecycle Policy FAQ.
Severity Ratings and Vulnerability Identifiers
The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the September bulletin summary. For more information, see Microsoft Exploitability Index.
In the following table: Where specified, Critical, Moderate, and Low values indicate severity ratings. For more information, see Security Bulletin Severity Rating System. Where specified, RCE (Remote Code Execution), Information Disclosure, and Security Feature Bypass indicate maximum impact.
For example, Windows Clients: Critical / RCE specifies that the vulnerability is Critical severity with impact of remote code execution for the affected version of Internet Explorer running on a Windows client operating system. Windows Servers: Moderate / RCE specifies that the vulnerability is Moderate severity with impact of remote code execution for the affected version of Internet Explorer running on a Windows server operating system. Windows Clients:Important / Information Disclosure specifies that the vulnerability is Important severity with impact of information disclosure for the affected version of Internet Explorer running on a Windows client. Windows Servers: Low / Information Disclosure specifies that the vulnerability is Low severity with impact of information disclosure for the affected version of Internet Explorer running on a Windows server operating system. Windows Clients:Moderate / DOS or Windows Servers:Moderate / DOS specifies that the vulnerability is Moderate severity with impact of denial of service for the affected version of Internet Explorer running on a Windows client operating system or on a Windows server operating system.
Severity Ratings and Impact
CVE number | Vulnerability Title | Internet Explorer 6 | Internet Explorer 7 | Internet Explorer 8 | Internet Explorer 9 | Internet Explorer 10 | Internet Explorer 11 |
---|---|---|---|---|---|---|---|
CVE-2013-7331 | Internet Explorer Resource Information Disclosure Vulnerability | Windows Clients: Important / Information Disclosure Windows Servers: Low / Information Disclosure |
Windows Clients: Important / Information Disclosure Windows Servers: Low / Information Disclosure |
Windows Clients: Important / Information Disclosure Windows Servers: Low / Information Disclosure |
Windows Clients: Important / Information Disclosure Windows Servers: Low / Information Disclosure |
Windows Clients: Important / Information Disclosure Windows Servers: Low / Information Disclosure |
Windows Clients: Important / Information Disclosure Windows Servers: Low / Information Disclosure |
CVE-2014-2799 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4059 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4065 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4079 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4080 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4081 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4082 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Not applicable |
CVE-2014-4083 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4084 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Not applicable |
CVE-2014-4085 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE number | Vulnerability Title | Internet Explorer 6 | Internet Explorer 7 | Internet Explorer 8 | Internet Explorer 9 | Internet Explorer 10 | Internet Explorer 11 |
CVE-2014-4086 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Not applicable | Not applicable | Not applicable |
CVE-2014-4087 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4088 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4089 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4090 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4091 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4092 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4093 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Not applicable |
CVE-2014-4094 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4095 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE number | Vulnerability Title | Internet Explorer 6 | Internet Explorer 7 | Internet Explorer 8 | Internet Explorer 9 | Internet Explorer 10 | Internet Explorer 11 |
CVE-2014-4096 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4097 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4098 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4099 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Windows Clients: Moderate / DOS Windows Servers: Moderate / DOS |
Windows Clients: Moderate / DOS Windows Servers: Moderate / DOS |
Windows Clients: Moderate / DOS Windows Servers: Moderate / DOS |
CVE-2014-4100 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4101 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4102 | Internet Explorer Memory Corruption Vulnerability | Not applicable | Not applicable | Not applicable | Not applicable | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4103 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4104 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4105 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE number | Vulnerability Title | Internet Explorer 6 | Internet Explorer 7 | Internet Explorer 8 | Internet Explorer 9 | Internet Explorer 10 | Internet Explorer 11 |
CVE-2014-4106 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4107 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4108 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4109 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4110 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
CVE-2014-4111 | Internet Explorer Memory Corruption Vulnerability | Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Windows Clients: Critical / RCE Windows Servers: Moderate / RCE |
Internet Explorer Resource Information Disclosure Vulnerability – CVE-2013-7331
An information disclosure vulnerability exists in Internet Explorer which allows resources loaded into memory to be queried. This vulnerability could allow an attacker to detect anti-malware applications in use on a target and use the information to avoid detection.
To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, click the link in the following table:
Vulnerability title | CVE number |
Internet Explorer Resource Information Disclosure Vulnerability | CVE-2013-7331 |
CVE number | Publicly Disclosed |
CVE-2013-7331 | Yes. This vulnerability has been publicly disclosed. |
CVE number | Exploited |
CVE-2013-7331 | Yes. Microsoft is aware of limited active attacks that attempt to exploit this vulnerability. |
Vulnerability title | CVE number |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-2799 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4059 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4065 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4079 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4080 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4081 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4082 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4083 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4084 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4085 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4086 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4087 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4088 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4089 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4090 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4091 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4092 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4093 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4094 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4095 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4096 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4097 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4098 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4099 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4100 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4101 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4102 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4103 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4104 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4105 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4106 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4107 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4108 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4109 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4110 |
Internet Explorer Memory Corruption Vulnerability | CVE-2014-4111 |
CVE number | Publicly Disclosed |
CVE-2014-2799 | No |
CVE-2014-4059 | No |
CVE-2014-4065 | No |
CVE-2014-4079 | No |
CVE-2014-4080 | No |
CVE-2014-4081 | No |
CVE-2014-4082 | No |
CVE-2014-4083 | No |
CVE-2014-4084 | No |
CVE-2014-4085 | No |
CVE-2014-4086 | No |
CVE-2014-4087 | No |
CVE-2014-4088 | No |
CVE-2014-4089 | No |
CVE-2014-4090 | No |
CVE-2014-4091 | No |
CVE-2014-4092 | No |
CVE-2014-4093 | No |
CVE-2014-4094 | No |
CVE-2014-4095 | No |
CVE-2014-4096 | No |
CVE-2014-4097 | No |
CVE-2014-4098 | No |
CVE-2014-4099 | No |
CVE-2014-4100 | No |
CVE-2014-4101 | No |
CVE-2014-4102 | No |
CVE-2014-4103 | No |
CVE-2014-4104 | No |
CVE-2014-4105 | No |
CVE-2014-4106 | No |
CVE-2014-4107 | No |
CVE-2014-4108 | No |
CVE-2014-4109 | No |
CVE-2014-4110 | No |
CVE-2014-4111 | No |
CVE number | Exploited |
CVE-2014-2799 | No |
CVE-2014-4059 | No |
CVE-2014-4065 | No |
CVE-2014-4079 | No |
CVE-2014-4080 | No |
CVE-2014-4081 | No |
CVE-2014-4082 | No |
CVE-2014-4083 | No |
CVE-2014-4084 | No |
CVE-2014-4085 | No |
CVE-2014-4086 | No |
CVE-2014-4087 | No |
CVE-2014-4088 | No |
CVE-2014-4089 | No |
CVE-2014-4090 | No |
CVE-2014-4091 | No |
CVE-2014-4092 | No |
CVE-2014-4093 | No |
CVE-2014-4094 | No |
CVE-2014-4095 | No |
CVE-2014-4096 | No |
CVE-2014-4097 | No |
CVE-2014-4098 | No |
CVE-2014-4099 | No |
CVE-2014-4100 | No |
CVE-2014-4101 | No |
CVE-2014-4102 | No |
CVE-2014-4103 | No |
CVE-2014-4104 | No |
CVE-2014-4105 | No |
CVE-2014-4106 | No |
CVE-2014-4107 | No |
CVE-2014-4108 | No |
CVE-2014-4109 | No |
CVE-2014-4110 | No |
CVE-2014-4111 | No |
Security update file names | For Internet Explorer 6 for all supported 32-bit editions of Windows Server 2003: WindowsServer2003-KB2977629-x86-ENU.exe |
For Internet Explorer 6 for all supported x64-based editions of Windows Server 2003: WindowsServer2003-KB2977629-x64-ENU.exe |
|
For Internet Explorer 6 for all supported Itanium-based editions of Windows Server 2003: WindowsServer2003-KB2977629-ia64-ENU.exe |
|
For Internet Explorer 7 for all supported 32-bit editions of Windows Server 2003: IE7-WindowsServer2003-KB2977629-x86-ENU.exe |
|
For Internet Explorer 7 for all supported x64-based editions of Windows Server 2003: IE7-WindowsServer2003-KB2977629-x64-ENU.exe |
|
For Internet Explorer 7 for all supported Itanium-based editions of Windows Server 2003: IE7-WindowsServer2003-KB2977629-ia64-ENU.exe |
|
For Internet Explorer 8 for all supported 32-bit editions of Windows Server 2003: IE8-WindowsServer2003-KB2977629-x86-ENU.exe |
|
For Internet Explorer 8 for all supported x64-based editions of Windows Server 2003: IE8-WindowsServer2003-KB2977629-x64-ENU.exe |
|
Installation switches | See Microsoft Knowledge Base Article 262841 |
Update log file | For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: KB2977629.log |
For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: KB2977629-IE7.log |
|
For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003: KB2977629-IE8.log |
|
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: Use Add or Remove Programs item in Control Panel or the Spuninst.exe utility located in the Use the Spuninst.exe utility, located in the %Windir%\$NTUninstallKB2977629$\Spuninst folder |
For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: Use Add or Remove Programs item in Control Panel or the Spuninst.exe utility located in the %Windir%\ie7updates\KB2977629-IE7\spuninst folder |
|
For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003: Use Add or Remove Programs item in Control Panel or the Spuninst.exe utility located in the %Windir%\ie8updates\KB2977629-IE8\spuninst folder |
|
File information | See Microsoft Knowledge Base Article 2977629 |
Registry key verification | For Internet Explorer 6 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows Server 2003\SP3\KB2977629\Filelist |
For Internet Explorer 7 for all supported 32-bit editions, x64-based editions, and Itanium-based editions of Windows Server 2003: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows Server 2003\SP0\KB2977629-IE7\Filelist |
|
For Internet Explorer 8 for all supported 32-bit editions and x64-based editions of Windows Server 2003: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Updates\Windows Server 2003\SP0\KB2977629-IE8\Filelist |
Windows Vista (all editions)
Reference Table
The following table contains the security update information for this software.
Security update file names | For Internet Explorer 7 in all supported 32-bit editions of Windows Vista: Windows6.0-KB2977629-x86.msu |
For Internet Explorer 7 in all supported x64-based editions of Windows Vista: Windows6.0-KB2977629-x64.msu |
|
For Internet Explorer 8 in all supported 32-bit editions of Windows Vista: IE8-Windows6.0-KB2977629-x86.msu |
|
For Internet Explorer 8 in all supported x64-based editions of Windows Vista: IE8-Windows6.0-KB2977629-x64.msu |
|
For Internet Explorer 9 for all supported 32-bit editions of Windows Vista: IE9-Windows6.0-KB2977629-x86.msu |
|
For Internet Explorer 9 for all supported x64-based editions of Windows Vista: IE9-Windows6.0-KB2977629-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2977629 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file names | For Internet Explorer 7 in all supported 32-bit editions of Windows Server 2008: Windows6.0-KB2977629-x86.msu |
For Internet Explorer 7 in all supported x64-based editions of Windows Server 2008: Windows6.0-KB2977629-x64.msu |
|
For Internet Explorer 7 in all supported Itanium-based editions of Windows Server 2008: Windows6.0-KB2977629-ia64.msu |
|
For Internet Explorer 8 in all supported 32-bit editions of Windows Server 2008: IE8-Windows6.0-KB2977629-x86.msu |
|
For Internet Explorer 8 in all supported x64-based editions of Windows Server 2008: IE8-Windows6.0-KB2977629-x64.msu |
|
For Internet Explorer 9 for all supported 32-bit editions of Windows Server 2008: IE9-Windows6.0-KB2977629-x86.msu |
|
For Internet Explorer 9 in all supported x64-based editions of Windows Server 2008: IE9-Windows6.0-KB2977629-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | WUSA.exe does not support uninstall of updates. To uninstall an update installed by WUSA, click Control Panel, and then click Security. Under Windows Update, click View installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2977629 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file name | For Internet Explorer 8 in all supported 32-bit editions of Windows 7: Windows6.1-KB2977629-x86.msu |
For Internet Explorer 8 in all supported x64-based editions of Windows 7: Windows6.1-KB2977629-x64.msu |
|
For Internet Explorer 9 for all supported 32-bit editions of Windows 7: IE9-Windows6.1-KB2977629-x86.msu |
|
For Internet Explorer 9 for all supported x64-based editions of Windows 7: IE9-Windows6.1-KB2977629-x64.msu |
|
For Internet Explorer 10 for Windows 7 for 32-bit Systems Service Pack 1: IE10-Windows6.1-KB2977629-x86.msu |
|
For Internet Explorer 10 for Windows 7 for x64-based Systems Service Pack 1: IE10-Windows6.1-KB2977629-x64.msu |
|
For Internet Explorer 11 for Windows 7 for 32-bit Systems Service Pack 1: IE11-Windows6.1-KB2977629-x86.msu |
|
For Internet Explorer 11 for Windows 7 for x64-based Systems Service Pack 1: IE11-Windows6.1-KB2977629-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, and then under Windows Update, click View installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2977629 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file name | For Internet Explorer 8 in all supported x64-based editions of Windows Server 2008 R2: Windows6.1-KB2977629-x64.msu |
For Internet Explorer 8 in all supported Itanium-based editions of Windows Server 2008 R2: Windows6.1-KB2977629-ia64.msu |
|
For Internet Explorer 9 for all supported x64-based editions of Windows Server 2008 R2: IE9-Windows6.1-KB2977629-x64.msu |
|
For Internet Explorer 10 for Windows Server 2008 R2 for x64-based Systems Service Pack 1: IE10-Windows6.1-KB2977629-x64.msu |
|
For Internet Explorer 11 for Windows Server 2008 R2 for x64-based Systems Service Pack 1: IE11-Windows6.1-KB2977629-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, and then under Windows Update, click View installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2977629 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file name | For Internet Explorer 10 in all supported 32-bit editions of Windows 8: Windows8-RT-KB2977629-x86.msu |
For Internet Explorer 10 in all supported x64-based editions of Windows 8: Windows8-RT-KB2977629-x64.msu |
|
For Internet Explorer 11 in all supported 32-bit editions of Windows 8.1: Windows8.1-KB2977629-x86.msu |
|
For Internet Explorer 11 in all supported x64-based editions of Windows 8.1: Windows8.1-KB2977629-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, click Windows Update, and then under See also, click Installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2977629 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Security update file name | For Internet Explorer 10 in all supported editions of Windows Server 2012: Windows8-RT-KB2977629-x64.msu |
For Internet Explorer 11 in all supported editions of Windows Server 2012 R2: Windows8.1-KB2977629-x64.msu |
|
Installation switches | See Microsoft Knowledge Base Article 934307 |
Restart requirement | Yes, you must restart your system after you apply this security update. |
Removal information | To uninstall an update installed by WUSA, use the /Uninstall setup switch or click Control Panel, click System and Security, click Windows Update, and then under See also, click Installed updates and select from the list of updates. |
File information | See Microsoft Knowledge Base Article 2977629 |
Registry key verification | Note A registry key does not exist to validate the presence of this update. |
Deployment | This update is available via Windows Update. |
Restart Requirement | Yes, you must restart your system after you apply this security update. |
Removal Information | Click Control Panel, click System and Security, click Windows Update, and then under See also, click Installed updates and select from the list of updates. |
File information | Not applicable |