The
following files are available for download from the Microsoft Download
Center:
Release Date: July 26, 2001
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591�
How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.
RPC fixes include the following
files.
Collapse this tableExpand this table
| File name | Current version |
|---|
| Dbserver.sch | 5.5.2654.50 |
| Dcprods.cat | 5.5.2654.50 |
| Dsamain.exe | 5.5.2654.48 |
| Ems_rid.dll | 5.5.2654.50 |
| Emsmta.exe | 5.5.2654.50 |
| Eseback.dll | 5.5.2654.51 |
| Infoplog.cfg | 5.5.2654.50 |
| Mad.exe | 5.5.2654.51 |
| Mtacheck.exe | 5.5.2654.50 |
| Mtamsg.dll | 5.5.2654.50 |
| Mtaperf.dll | 5.5.2654.50 |
| P2.xv2 | 5.5.2654.50 |
| P42.tpl | 5.5.2654.50 |
| P772.tpl | 5.5.2654.50 |
| Store.exe | 5.5.2654.50 |
| X400om.dll | 5.5.2654.50 |
Fixes Released on July 26, 2001
The following files are modified:
- Dbserver.sch incremented to version 5.5.2654.50
- Dcprods.cat incremented to version 5.5.2654.50
- Dsamain.exe incremented to version 5.5.2654.48
- Ems_rid.dll incremented to version 5.5.2654.50
- Emsmta.exe incremented to version 5.5.2654.50
- Infoplog.cfg incremented to version 5.5.2654.50
- Mad.exe incremented to version 5.5.2654.51
- Mtacheck.exe incremented to version 5.5.2654.50
- Mtamsg.dll incremented to version 5.5.2654.50
- Mtaperf.dll incremented to version 5.5.2654.50
- P2.xv2 incremented to version 5.5.2654.50
- P42.tpl incremented to version 5.5.2654.50
- P772.tpl incremented to version 5.5.2654.50
- Store.exe incremented to version 5.5.2654.50
- X400om.dll incremented to version 5.5.2654.50
- Eseback.dll incremented to version 5.5.2654.51
The following fixes are included.
For additional information about an RPC vulnerability, see
the following Microsoft Web site: