{"id":2622,"date":"2017-04-12T01:20:00","date_gmt":"2017-04-11T23:20:00","guid":{"rendered":"http:\/\/borncity.com\/win\/?p=2622"},"modified":"2023-07-19T16:21:05","modified_gmt":"2023-07-19T14:21:05","slug":"windows-78-1-security-updates-april-11-2017","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2017\/04\/12\/windows-78-1-security-updates-april-11-2017\/","title":{"rendered":"Windows 7\/8.1: security updates April 11, 2017"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" title=\"Update\" style=\"border-left-width: 0px; border-right-width: 0px; border-bottom-width: 0px; float: left; margin: 0px 10px 0px 0px; display: inline; border-top-width: 0px\" border=\"0\" alt=\"Windows Update\" src=\"http:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/02\/Update.jpg\" width=\"40\" align=\"left\" height=\"40\">On April 11, 2017) Microsoft has released Security only updates and Update Rollups for Windows 7 SP1 and Windows 8.1 and for corresponding Server variants. <\/p>\n<p><!--more--><\/p>\n<h3>KB4015549&nbsp; (Monthly Rollup) for Windows 7 SP1<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/ssl-vg03.met.vgwort.de\/na\/dbefed11d31449bf8d4c1c3f7f875bdf\" width=\"1\" height=\"1\">Update <a href=\"https:\/\/support.microsoft.com\/kb\/4015549\" target=\"_blank\" rel=\"noopener\">KB4015549<\/a> (April 11, 2017 Security Monthly Quality Rollup for Windows 7 SP1 and Windows Server 2008 R2 SP1) contains bug fixes and improvements and addresses the following vulnerabilities:  <\/p>\n<blockquote>\n<p>Scripting engine, Hyper-V, libjpeg image-processing library, Adobe Type Manager Font Driver, Win32K, Microsoft Outlook, Internet Explorer, Graphics Component, Windows kernel-mode drivers and Lightweight Directory Access Protocol.<\/p>\n<\/blockquote>\n<p>Note: This update is blocking further updates (download and install) on AMD Carrizo DDR4 processor systems.&nbsp; <\/p>\n<h3>KB4015546&nbsp; (Security-only update) for Windows 7<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/kb\/4015546\" target=\"_blank\" rel=\"noopener\">KB4015546<\/a> (April 2017 Security Only Update for Windows 7 SP1 and Windows Server 2008 R2 SP1) addresses vulnerabilities mentioned above.&nbsp; <\/p>\n<p>The update history for Windows 7 may be found at <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/22801\/windows-7-sp1-and-windows-server-2008-r2-sp1-update-history\" target=\"_blank\" rel=\"noopener\">this Microsoft site<\/a>.  <\/p>\n<h3>KB4015550 (Monthly Rollup)&nbsp; for Windows 8.1<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/kb\/4015550\" target=\"_blank\" rel=\"noopener\">KB4015550<\/a> (April 2017 Security Monthly Quality Rollup for Windows 8.1 and Windows Server 2012 R2) bug fixes and improvements and addresses the following vulnerabilities:  <\/p>\n<ul>\n<li>Resolves the security vulnerabilities in Hyper-V, libjpeg image-process library, Win32K, Adobe Type Manager font driver, Active Directory Federation Services, Lightweight Directory Access Protocol, Windows kernel-mode drivers, OLE, Scripting Engine, Windows Graphics component and Internet Explorer&nbsp;\n<li>Addressed an issue that was causing Authentication Success and Failure events with Event ID 4768 to not be logged after installing KB4012216.\n<li>Addressed a bug check encountered on Windows Server 2012 R2 Hyper-V hosts with error code 0xE4 after installing KB4012216.\n<li>Addressed issue where a server may fail with STOP 0x3B error leading to data loss when Input Method Editors (IME) like keyboards are installed.<\/li>\n<\/ul>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/kb\/4015550\" target=\"_blank\" rel=\"noopener\">KB4015550<\/a> is available via Windows Update or in Microsoft Update Catalog. <\/p>\n<blockquote>\n<p>Note: This update is blocking further updates (download and install) on AMD Carrizo DDR4 processor systems. I received also a notice, that update <a href=\"https:\/\/support.microsoft.com\/kb\/4015550\" target=\"_blank\" rel=\"noopener\">KB4015550<\/a> is causing error 0xc0000005 (Access Violation) on Microsoft Removal Tool. <\/p>\n<\/blockquote>\n<h3>KB4015547 (Security-only update) for Windows 8.1<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/kb\/4015547\" target=\"_blank\" rel=\"noopener\">KB4015547<\/a> (April 2017 Security Only for Windows 8.1 and Windows Server 2012 R2) addresses:  <\/p>\n<ul>\n<li>Security vulnerabilities in Hyper-V, libjpeg image-process library, Win32K, Adobe Type Manager font driver, Active Directory Federation Services, Lightweight Directory Access Protocol, Windows kernel-mode drivers, OLE, Scripting Engine, Windows Graphics component and Internet Explorer\n<li>Addressed an issue that was causing Authentication Success and Failure events with Event ID 4768 to not be logged after installing KB4012213.\n<li>Addressed a bug check encountered on Windows Server 2012 R2 Hyper-V hosts with error code 0xE4 after installing KB4012213.\n<li>Enabled detection of processor generation and hardware support when PC tries to scan or download updates through Windows Update.<\/li>\n<\/ul>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/kb\/4015547\" target=\"_blank\" rel=\"noopener\">KB4015547<\/a> is available via WSUS, and as Download via Microsoft Update Catalog. The package contains no IE security patch.&nbsp; <\/p>\n<p>The update history for Windows 8.1 may be found <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/24717\/windows-8-1-and-windows-server-2012-r2-update-history\">here<\/a>. Note: This update is blocking further updates (download and install) on AMD Carrizo DDR4 processor systems. <\/p>\n<h3>KB4015548 (Security-only update) for Windows Server 2012 Standard<\/h3>\n<p>Update <a href=\"https:\/\/support.microsoft.com\/kb\/4015548\" target=\"_blank\" rel=\"noopener\">KB4015548<\/a> (April 2017 Security Only for Windows Server 2012 Standard) has been released via WSUS and Microsoft Update Catalog.&nbsp; <\/p>\n<p><strong>Similar articles:<br \/><\/strong>Adobe Flash security update (April 11, 2017)<br \/>Microsoft Security Updates April 11, 2017<br \/><a href=\"https:\/\/borncity.com\/win\/2017\/04\/12\/windows-78-1-security-updates-april-11-2017\/\">Windows 7\/8.1: security updates April 11, 2017<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2017\/04\/12\/windows-10-security-updates-april-11-2017\/\">Windows 10: security updates April 11, 2017<\/a><br \/><a href=\"https:\/\/borncity.com\/win\/2017\/04\/12\/april-2017-seucrity-updates-for-office-ie-and-net\/\">April 2017 seucrity updates for Office, IE and .NET<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On April 11, 2017) Microsoft has released Security only updates and Update Rollups for Windows 7 SP1 and Windows 8.1 and for corresponding Server variants.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22,2],"tags":[100,715,159],"class_list":["post-2622","post","type-post","status-publish","format-standard","hentry","category-update","category-windows","tag-updates","tag-windows-78-1","tag-windows-server"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/2622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=2622"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/2622\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=2622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=2622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=2622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}