MS15-068: Vulnerabilities in Windows #HyperV Could Allow Remote Code Execution – July 14, 2015

Hello Folks,

Hyper-V is the most secure hypervisor today with a very good security track record, nevertheless a few security issues that did arise over the years that have always been addressed quickly.

Microsoft just released a new critical security update to address a vulnerability in Windows Hyper-V that could allow remote code execution (3072000).

The following articles contain additional information about this security update as it relates to individual product versions. The articles may contain known issue information.

  • 3046359 MS15-068: Description of the security update for Windows Hyper-V: July 14, 2015
  • 3046339 MS15-068: Description of the security update for Windows Hyper-V: July 14, 2015

This security update is rated Critical for Windows Hyper-V on Windows Server 2008, Windows Server 2008 R2, Windows 8 and Windows Server 2012, and Windows 8.1 and Windows Server 2012 R2.

The security update addresses the vulnerabilities by correcting how Hyper-V initializes system data structures in guest virtual machines.

For more information about this update, see Microsoft Knowledge Base Article 3072000.

Please secure and update your environment effectively now.

Cheers,
/Charbel

About Charbel Nemnom 323 Articles

Charbel Nemnom is a Microsoft Cloud Consultant and Technical Evangelist, totally fan of the latest’s IT platform solutions, accomplished hands-on technical professional with over 15 years of broad IT Infrastructure experience serving on and guiding technical teams to optimize performance of mission-critical enterprise systems. Excellent communicator adept at identifying business needs and bridging the gap between functional groups and technology to foster targeted and innovative IT project development. Well respected by peers through demonstrating passion for technology and performance improvement. Extensive practical knowledge of complex systems builds, network design and virtualization.

Be the first to comment

Leave a Reply