Tag Archives: Schannel

Msv1_0.dll – Pre Service Pack 3 Revision History for Windows Vista SP2, Windows Server 2008 SP2 and Windows Small Business Server 2008 (SBS 2008)

Msv1_0.dll – Pre Service Pack 3 Revision History for Windows Vista SP2, Windows Server 2008 SP2 and Windows Small Business Server 2008 (SBS 2008)

16-Nov-2011 – 6.0.6002.22742 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

16-Sep-2010 – 6.0.6002.22489 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/2346270 – You receive a “Stop error 0xC0000244 {Audit Failed}” error message during the shutdown process after you enable the CrashOnAuditFail setting on a computer that is running Windows Server 2008 or Windows Vista

10-Sep-2009 – 6.0.6002.22223 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/975467 – MS09-059: Vulnerability in the Local Security Authority Subsystem Service could allow denial of service

10-Sep-2009 – 6.0.6002.18111 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

10-Sep-2009 – 6.0.6002.18111 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/975467 – MS09-059: Vulnerability in the Local Security Authority Subsystem Service could allow denial of service

21-Aug-2009 – 6.0.6002.22207 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/974738 – Error message when you use the MBSA tool to check for weak passwords or to assess password security on a computer that is running Windows Server 2008 or Windows Vista: “Some user accounts have blank or simple passwords, or could not be analyzed”

19-Aug-2009 – 6.0.6002.22204 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/972595 – You cannot log on or the system stops responding when the Stored User Names and Passwords feature is enabled on a computer that is running Windows Server 2008 or Windows Vista

06-Aug-2009 – 6.0.6002.22192 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/969837 – The Lsass.exe process crashes when the Network Service account runs a service that calls the IADsUser::ChangePassword method to change the machine account password of the member server that is running the service

15-Jun-2009 – 6.0.6002.22152 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/968389 – Extended Protection for Authentication

15-Jun-2009 – 6.0.6002.18051 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/968389 – Extended Protection for Authentication

20-May-2009 – 6.0.6002.22139 – Msv1_0.dll – x86/x64 – http://support.microsoft.com/kb/971265 – A memory leak issue in the Lsass.exe process causes an application or a service to stop responding if the application or the service uses the NTLM authentication on a computer that is running Windows Server 2008 or Windows Vista

Schannel.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

Schannel.dll – Pre Service Pack 2 Revision History for Windows 7 SP1, Windows Server 2008 R2 SP1 and Windows Small Business Server 2011 (SBS 2011)

05-May-2015 – 6.1.7601.23045 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

05-May-2015 – 6.1.7601.18843 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-us/kb/3061518 – MS15-055: Vulnerability in Schannel could allow information disclosure: May 12, 2015

06-Mar-2015 – 6.1.7601.22983 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-gb/kb/3046049 – MS15-031: Vulnerability in SChannel could allow security feature bypass: March 10, 2015

06-Mar-2015 – 6.1.7601.18779 – Schannel.dll – x86/x64 – https://support.microsoft.com/en-gb/kb/3046049 – MS15-031: Vulnerability in SChannel could allow security feature bypass: March 10, 2015

14-Oct-2014 – 6.1.7601.22843 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3011780 – MS14-068: Vulnerability in Kerberos could allow elevation of privilege: November 18, 2014

14-Oct-2014 – 6.1.7601.22843 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3003743 – MS14-074: Vulnerability in Remote Desktop Protocol could allow security feature bypass: November 11, 2014

19-Sep-2014 – 6.1.7601.22814 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2992611 – MS14-066: Vulnerability in SChannel could allow remote code execution: November 11, 2014

19-Sep-2014 – 6.1.7601.18606 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3011780 – MS14-068: Vulnerability in Kerberos could allow elevation of privilege: November 18, 2014

19-Sep-2014 – 6.1.7601.18606 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2992611 – MS14-066: Vulnerability in SChannel could allow remote code execution: November 11, 2014

11-Jul-2014 – 6.1.7601.22741 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2982706 – You cannot access network shares after the computer restarts in Windows 8.1 or Windows 7

30-May-2014 – 6.1.7601.22705 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2

30-May-2014 – 6.1.7601.18489 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/3003743 – MS14-074: Vulnerability in Remote Desktop Protocol could allow security feature bypass: November 11, 2014

30-May-2014 – 6.1.7601.18489 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2973337 – SHA512 is disabled in Windows when you use TLS 1.2

10-Jun-2013 – 6.1.7601.22352 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2830145 – SID S-1-18-1 and SID S-1-18-2 can’t be mapped on Windows 7 or Windows Server 2008 R2-based computers in a domain environment

08-Mar-2013 – 6.1.7601.22276 – Schannel.dll – x64 – http://support.microsoft.com/kb/2824066 – Hotfix is available that corrects “User’s SID” in event ID 6035 in Windows Server 2008 R2

05-Nov-2012 – 6.1.7601.22153 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2768492 – User cannot connect to remote desktop server on a Windows 7-based or Windows Server 2008 R2-based client computer

02-Nov-2012 – 6.1.7601.22150 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2760730 – Description of an update rollup that resolves interoperation issues in Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, and Windows Server 2008 R2 SP1

21-Sep-2012 – 6.1.7601.22116 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2748437 – User profile folder name is displayed as “user name@domain name” when use a UPN to log on to a Windows 7-based or Windows Server 2008 R2-based client computer

23-Jul-2012 – 6.1.7601.22068 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1

20-Jul-2012 – 6.1.7601.17911 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2574819 – An update is available that adds support for DTLS in Windows 7 SP1 and Windows Server 2008 R2 SP1

02-Jun-2012 – 6.1.7601.22010 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012

02-Jun-2012 – 6.1.7601.17856 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2655992 – MS12-049: Vulnerability in TLS could allow information disclosure: July 10, 2012

06-Apr-2012 – 6.1.7601.21959 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2695401 – DPAPI keys are not synchronized when you unlock a Windows 7-based or Windows Server 2008 R2-based computer

10-Feb-2012 – 6.1.7601.21920 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2675498 – “NetBIOS domain name\username” format cannot be used with the Kerberos referral mechanism to log on to a computer in a cross-forest environment

18-Jan-2012 – 6.1.7601.21901 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2665790 – Resource-based constrained delegation KDC_ERR_POLICY failure in environments that have Windows Server 2008 R2-based domain controllers

17-Nov-2011 – 6.1.7601.21861 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

17-Nov-2011 – 6.1.7601.17725 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2585542 – MS12-006: Description of the security update for Webio, Winhttp, and schannel in Windows: January 10, 2012

18-Dec-2010 – 6.1.7601.21624 – Schannel.dll – x86/x64 – http://support.microsoft.com/kb/2416849 – SSL authentication fails and X.509 error occurs when a WCF-enabled application performs mutual authentication in Windows 7, in Windows Server 2008 R2, in Windows Vista, or in Windows Server 2008