Category Archives: Service Pack 1

Rpcrt4.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

Rpcrt4.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

24-Dec-2013 – 6.1.7601.22550 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2916915 – Outlook may take two to three minutes to connect to an Office 365 mailbox

09-Jul-2013 – 6.1.7601.22380 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2849470 – MS13-062: Vulnerability in remote procedure call could allow elevation of privilege: August 13, 2013

09-Jul-2013 – 6.1.7601.18205 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2849470 – MS13-062: Vulnerability in remote procedure call could allow elevation of privilege: August 13, 2013

11-Jul-2012 – 6.1.7601.22054 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2734410 – RPC client application stops responding on a computer that is running Windows Server 2008 R2 or Windows 7

05-Nov-2011 – 6.1.7601.21855 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2619234 – A hotfix is available to enable the Association Cookie/GUID that is used by RPC over HTTP to also be used at the RPC layer in Windows 7 and in Windows Server 2008 R2

29-Oct-2011 – 6.1.7601.21849 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2637692 – RPC threads may stop responding in Windows 7 or in Windows Server 2008 R2

06-Jan-2011 – 6.1.7601.21635 – Rpcrt4.dll – x86/x64 – http://support.microsoft.com/kb/2457402 – You experience delays with an application or service that uses NTDSA APIs for passing changes from RWDC data centers to RODC data centers

Cryptdll.dll – Pre Service Pack 2 Revision History for Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

Cryptdll.dll – Pre Service Pack 2 Revision History for Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

09-Oct-2012 – 6.1.7601.22130 – Cryptdll.dll – x86/x64 – http://support.microsoft.com/kb/2768494 – You cannot log on to a Windows 7-based or Windows Server 2008 R2-based client computer after you disable AES encryption for Kerberos authentication

23-May-2011 – 6.1.7601.21732 – Cryptdll.dll – x64 – http://support.microsoft.com/kb/2545833 – Slow performance occurs when many user authentication requests are handled in Windows Server 2008 R2

Lsass.exe – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

Lsass.exe – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

04-Apr-2015 – 6.1.7601.23017 – Lsass.exe – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

04-Apr-2015 – 6.1.7601.18812 – Lsass.exe – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

30-May-2014 – 6.1.7601.22705 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2

30-May-2014 – 6.1.7601.18489 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2

12-Apr-2014 – 6.1.7601.22653 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2982706 – You cannot access network shares after the computer restarts in Windows 8.1 or Windows 7

25-Sep-2013 – 6.1.7601.22465 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2868725 – Microsoft security advisory: Update for disabling RC4

25-Sep-2013 – 6.1.7601.18270 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2868725 – Microsoft security advisory: Update for disabling RC4

31-Aug-2013 – 6.1.7601.22438 – Lsass.exe – x64 – http://support.microsoft.com/kb/2883492 – SEC_E_INTERNAL_ERROR error when a 32-bit application calls the SChannel implementation of the InitializeSecurityContext function in Windows 7 or Windows Server 2008 R2

10-Jun-2013 – 6.1.7601.22352 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2830145 – SID S-1-18-1 and SID S-1-18-2 can’t be mapped on Windows 7 or Windows Server 2008 R2-based computers in a domain environment

08-Mar-2013 – 6.1.7601.22276 – Lsass.exe – x64 – https://support.microsoft.com/kb/2824066 – Hotfix is available that corrects “User’s SID” in event ID 6035 in Windows Server 2008 R2

26-Sep-2012 – 6.1.7601.22119 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2760730 – Description of an update rollup that resolves interoperation issues in Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows Server 2008 R2 SP1

21-Sep-2012 – 6.1.7601.22116 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2748437 – User profile folder name is displayed as “user name@domain name” when use a UPN to log on to a Windows 7-based or Windows Server 2008 R2-based client computer

23-Jul-2012 – 6.1.7601.22068 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1

02-Jun-2012 – 6.1.7601.22010 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012

06-Apr-2012 – 6.1.7601.21959 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2695401 – DPAPI keys are not synchronized when you unlock a Windows 7-based or Windows Server 2008 R2-based computer

10-Feb-2012 – 6.1.7601.21920 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2675498 – “NetBIOS domain name\username” format cannot be used with the Kerberos referral mechanism to log on to a computer in a cross-forest environment

18-Jan-2012 – 6.1.7601.21901 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2665790 – Resource-based constrained delegation KDC_ERR_POLICY failure in environments that have Windows Server 2008 R2-based domain controllers

17-Nov-2011 – 6.1.7601.21861 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

17-Nov-2011 – 6.1.7601.17725 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1

17-Nov-2011 – 6.1.7601.17725 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012

17-Nov-2011 – 6.1.7601.17725 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

14-May-2011 – 6.1.7601.21728 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2545850 – Users cannot access an IIS-hosted website after the computer password for the server is changed in Windows 7 or in Windows Server 2008 R2

17-Mar-2011 – 6.1.7601.21685 – Lsass.exe – x86/x64 – http://support.microsoft.com/kb/2522623 – InitializeSecurityContext function might not fall back to NTLM authentication in Windows 7 or in Windows Server 2008 R2 when Kerberos fails and has the STATUS_NO_LOGON_SERVERS status

Schannel.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

Schannel.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

05-May-2015 – 6.1.7601.23045 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

05-May-2015 – 6.1.7601.18843 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

06-Mar-2015 – 6.1.7601.22983 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-gb/kb/3046049 – MS15-031: Vulnerability in SChannel could allow security feature bypass: March 10, 2015

06-Mar-2015 – 6.1.7601.18779 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-gb/kb/3046049 – MS15-031: Vulnerability in SChannel could allow security feature bypass: March 10, 2015

14-Oct-2014 – 6.1.7601.22843 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3011780 – MS14-068: Vulnerability in Kerberos could allow elevation of privilege: November 18, 2014

14-Oct-2014 – 6.1.7601.22843 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3003743 – MS14-074: Vulnerability in Remote Desktop Protocol could allow security feature bypass: November 11, 2014

19-Sep-2014 – 6.1.7601.22814 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2992611 – MS14-066: Vulnerability in SChannel could allow remote code execution: November 11, 2014

19-Sep-2014 – 6.1.7601.18606 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3011780 – MS14-068: Vulnerability in Kerberos could allow elevation of privilege: November 18, 2014

19-Sep-2014 – 6.1.7601.18606 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2992611 – MS14-066: Vulnerability in SChannel could allow remote code execution: November 11, 2014

11-Jul-2014 – 6.1.7601.22741 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2982706 – You cannot access network shares after the computer restarts in Windows 8.1 or Windows 7

30-May-2014 – 6.1.7601.22705 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2

30-May-2014 – 6.1.7601.18489 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3003743 – MS14-074: Vulnerability in Remote Desktop Protocol could allow security feature bypass: November 11, 2014

30-May-2014 – 6.1.7601.18489 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2

10-Jun-2013 – 6.1.7601.22352 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2830145 – SID S-1-18-1 and SID S-1-18-2 can’t be mapped on Windows 7 or Windows Server 2008 R2-based computers in a domain environment

08-Mar-2013 – 6.1.7601.22276 – Schannel.dll – x64 – http://support.microsoft.com/kb/2824066 – Hotfix is available that corrects “User’s SID” in event ID 6035 in Windows Server 2008 R2

05-Nov-2012 – 6.1.7601.22153 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2768492 – User cannot connect to remote desktop server on a Windows 7-based or Windows Server 2008 R2-based client computer

02-Nov-2012 – 6.1.7601.22150 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2760730 – Description of an update rollup that resolves interoperation issues in Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows Server 2008 R2 SP1

21-Sep-2012 – 6.1.7601.22116 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2748437 – User profile folder name is displayed as “user name@domain name” when use a UPN to log on to a Windows 7-based or Windows Server 2008 R2-based client computer

23-Jul-2012 – 6.1.7601.22068 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1

20-Jul-2012 – 6.1.7601.17911 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1

02-Jun-2012 – 6.1.7601.22010 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012

02-Jun-2012 – 6.1.7601.17856 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012

06-Apr-2012 – 6.1.7601.21959 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2695401 – DPAPI keys are not synchronized when you unlock a Windows 7-based or Windows Server 2008 R2-based computer

10-Feb-2012 – 6.1.7601.21920 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2675498 – “NetBIOS domain name\username” format cannot be used with the Kerberos referral mechanism to log on to a computer in a cross-forest environment

18-Jan-2012 – 6.1.7601.21901 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2665790 – Resource-based constrained delegation KDC_ERR_POLICY failure in environments that have Windows Server 2008 R2-based domain controllers

17-Nov-2011 – 6.1.7601.21861 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

17-Nov-2011 – 6.1.7601.17725 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

18-Dec-2010 – 6.1.7601.21624 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2416849 – SSL authentication fails and X.509 error occurs when a WCF-enabled application performs mutual authentication in Windows 7, in Windows Server 2008 R2, in Windows Vista, or in Windows Server 2008