Ms17-010 Patch Download Windows 8

How to download this patch 'ms17-010' it's very urgent to secure from ransomware. Ms17-010 security patch. Its been a while since i ran windows 7.

Following the massive Wana Decrypt0r ransomware outbreak from yesterday afternoon, Microsoft has released an out-of-bound patch for older operating systems to protect them against Wana Decrypt0r's self-spreading mechanism.

The operating systems are Windows XP, Windows 8, and Windows Server 2003. These are old operating systems that Microsoft stopped supporting years before and did not receive a fix for the SMBv1 exploit that the Wana Decrypt0r ransomware used yesterday as a self-spreading mechanism.

That mechanism is a modified version of the ETERNALBLUE exploit, an alleged NSA hacking tool leaked last month by a group known as The Shadow Brokers.

Original MS17-010 patch didn't include XP/Win8 fixes

Microsoft had released a fix for that exploit a month before, in March, in security bulletin MS17-010. That security bulletin only included fixes for Windows Vista, Windows 7, Windows 8.1, Windows 10, Windows Server 2008, Windows Server 2012, and Windows Server 2016.

As the SMBv1 is a protocol that comes built-in with all Windows versions, the computers which did not receive MS17-010 remained vulnerable to exploitation via Wana Decrypt0r's self-spreading package.

'Given the potential impact to customers and their businesses, we made the decision to make the Security Update for platforms in custom support only, Windows XP, Windows 8, and Windows Server 2003, broadly available for download,' Microsoft said in a statement. 'This decision was made based on an assessment of this situation, with the principle of protecting our customer ecosystem overall, firmly in mind.'

Researchers believe that Wana Decrypt0r — also referenced online as WCry, WannaCry, WannaCrypt, and WanaCrypt0r — infected over 141,000 computers.

Patch

While unconfirmed, many believe older Windows XP and Windows Server versions were the bulk of the infections pool, as they had no way to protect themselves.

Patch systems and disable SMBv1 where possible

Besides installing these out-of-band updates — available for download from here — Microsoft also advises companies and users to disable the SMBv1 protocol, as it's an old and outdated protocol, already superseded by newer versions, such as SMBv2 and SMBv3.

The current Wana Decrypt0r outbreak has been stopped last night after a security researcher found a kill switch. This is only temporary, as the attackers could release a new version of this threat. This is why patching the SMBv1 exploit is a better solution.

For those affected, you can discuss this ransomware and receive support in the dedicated WanaCrypt0r & Wana Decrypt0r Help & Support Topic. Bleeping Computer also published a technical analysis of the Wana Decrypt0r ransomware.

Related Articles:

Active2 years, 3 months ago

I have a small business windows 2011 standard server. The auto update is not working somehow. I want to download the patch and install manually. I have a look at this: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx

It didn't say anything about my server. Could anyone help me out?

Update 1:

https://technet.microsoft.com/en-us/library/gg697164(v=ws.11).aspx. small business win 2011 is based on 2008 R2. On this page: https://technet.microsoft.com/en-us/library/security/ms17-010.aspx I saw 4 security patch. For minimum, Do I install 'March, 2017 Security Only Quality Update for Windows Server 2008 R2 for x64-based Systems (KB4012212)'??????? I am running out of space.

kenpeter
kenpeterkenpeter

1 Answer

It's incredibly sad how many administrators only care about security updates when it's on a news!

The rest of us have installed these patches two months ago, when they were released. Therefore, we were sleeping well during the whole weekend. The SMB vulnerability has existed all this time, and the patch is released for the vulnerability, not for the WannaCry ransomware attack exploiting it.

You are running out of space, but security updates are the last you would like to miss for saving it. Configure your system for automatic updates. You could remove something less vital, move something to another partition/drive, or simply upgrade your hardware. Even upgrading to a larger hard drive is a minor investment compared to costs caused by recovering from an attack.

Windows Small Business Server 2011 Standard is based on the Windows Server 2008 R2, so the 2008 R2 section on MS17-010 is the correct information. Instead of direct patch for only this problem, Microsoft has simplified servicing models and currently releases a Monthly Rollup addressing both security and reliability issues and Security-only update that only include new security patches.

Historically, we have released individual patches for these platforms, which allowed you to be selective with the updates you deployed. This resulted in fragmentation where different PCs could have a different set of updates installed leading to multiple potential problems. - - The new rollup model gives you fewer updates to manage, greater predictability, and higher quality updates.

So, the Security Only update for 2008 R2 is perfectly adequate for addressing this particular problem.

Esa JokinenEsa Jokinen

Download Ms17 010 Patch

25.6k2 gold badges37 silver badges65 bronze badges

Microsoft Ms17 010 Patch Download

Not the answer you're looking for? Browse other questions tagged windowswindows-server-2008securitypatch or ask your own question.