Purpose
This document outlines how to install the updates necessary to remediate the Petya Vulnerability. For more information please see https://www.ivanti.com/blog/global-ransomware-attack-based-on-a-petya-variant-threatens-repeat-of-wannacry/
Overview
How to protect against the SMB Vulnerablity
- Install the following applicable patches - Content release 06/13/2017:
- If you are using Monthly Rollups - June 2017 Patch Tuesday
- MS17-06-MR7(Q4019264): Monthly Rollup for Windows 7 and 2008 R2: June 13, 2017
- MS17-06-MR8(Q4019216): Monthly Rollup for Server 2012: June 13, 2017
- MS17-06-MR81(Q4019215): Monthly Rollup for Windows 8.1 and 2012 R2: June 13, 2017
- MS17-06-2K8(Q4018466): Security update for the Windows SMB Information Disclosure Vulnerability in Windows Server 2008: June 13, 2017
- If you are using Security Only Updates or Bundles - June 2017 Patch Tuesday
- Windows 7 and Server 2008 R2 MS17-06-SO7(Q4022722): June 2017 Security Only Quality Update for Windows 7 SP1 and Windows Server 2008 R2 SP1
- Windows 8.1 and Server 2012 R2 MS17-06-SO81(Q4022717): June 2017 Security Only Quality Update for Windows 8.1 and Windows Server 2012 R2
- Windows Server 2012: MS17-06-SO8 (Q4022718): June 2017 Security Only Quality Update for Windows Server 2012
- In addition you need to install the March 2017 Patch Tuesday Security Only Updates containing MS17-010 as is mentioned here Latest information on WannaCrypt and How to Protect Against It (Shavlik Protect, Patch for Windows Server)
- Any of the Security Monthly Quality Rollups or Quality Previews for the above Operating Systems from June 2017 and later will also remediate this and all other existing vulnerabilities.
Scan for and report on the nessary updates in Ivanti Patch for Windows Servers
Please follow the example in Scan for and Report On Specific Patch(s) in Ivanti Patch for Windows Servers to search for, scan for, and report on the Qnumbers mentioned in this article.
Affected Products
Ivanti Patch for Windows Servers 9.3
Shavlik Protect 9.2