Patch Repository

Windows Server 2012 R2 Essentials Edition (x64) Patch Details
Patch Name Windows8.1-2012R2-KB3087088-x64.msu
Patch Description Security Update for Windows Server 2012 R2 (KB3087088)
Bulletin Id MS15-105
Bulletin Title Vulnerability in Windows Hyper-V Could Allow Security Feature Bypass (3091287)
Severity Important
Location Path Windows8.1-2012R2-KB3087088-x64.msu
Bulletin Summary This security update resolves a vulnerability in Microsoft Windows. The vulnerability could allow security feature bypass if an attacker runs a specially crafted application that could cause Windows Hyper-V to incorrectly apply access control list (ACL) configuration settings. Customers who have not enabled the Hyper-V role are not affected.
Superceding Bulletin Id MS16-045
Patch Release Date Apr 12, 2016

Affected Product Information

Product Name Service Pack Name
Windows Server 2012 R2 Datacenter Edition (x64)Windows Server 2012 R2 Gold (x64)
Windows Server 2012 R2 Essentials Edition (x64)Windows Server 2012 R2 Gold (x64)
Windows Server 2012 R2 Foundation Edition (x64)Windows Server 2012 R2 Gold (x64)
Windows Server 2012 R2 Standard Edition (x64)Windows Server 2012 R2 Gold (x64)
Update 1 for Windows 8.1 and Server 2012 R2Windows 8.1 Update 1
Windows Server 2012 R2 Storage Server Standard Edition (x64)Windows Server 2012 R2 Gold (x64)
Windows Server 2012 R2 Hyper-V Edition (x64)Windows Server 2012 R2 Gold (x64)
Windows Server 2012 R2 Storage Server Workgroup Edition (x64)Windows Server 2012 R2 Gold (x64)
Windows Server 2012 R2 Datacenter (evaluation installation) Edition (x64)Windows Server 2012 R2 Gold (x64)
Windows Server 2012 R2 Server Standard (evaluation installation) Edition (x64)Windows Server 2012 R2 Gold (x64)

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.