Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update of Windows XP and Windows Server 2003: June 13, 2017


View products that this article applies to.

Summary

Windows RPC remote code execution vulnerability
 

A remote code execution vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

To exploit this vulnerability, an attacker would need to run a specially crafted application against an RPC server which has Routing and Remote Access enabled. Routing and Remote Access is a non-default configuration; systems without it enabled are not vulnerable.

The security update addresses the vulnerability by correcting how the Routing and Remote Access service handles requests.

The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:

Vulnerability title

CVE number

Publicly disclosed

Exploited

Windows RPC Remote Code Execution Vulnerability

CVE-2017-8461

Yes

Yes

 

Mitigating Factors

Microsoft has not identified any mitigating factors for this vulnerability.

Workarounds

Microsoft has not identified any workarounds for this vulnerability.

↑ Back to the top


More Information

Important
 
  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


How to obtain and install the update

Method 1: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Method 2: Microsoft Download Center

The following files are available for download from the Microsoft Download Center.



For all x86-based versions of Windows Server 2003

Download the package now



For all x64-based versions of Windows Server 2003

Download the package now



For all x86-based versions of Windows XP

Download the package now



For all x64-based versions of Windows XP

Download the package now



For all versions of Windows XP Embedded

Download the package now

Release Date: June 13, 2017

For more information about how to download Microsoft support files, click the following article number to go to the article in the Microsoft Knowledge Base:



Virus-scan claim

Microsoft scanned this file for viruses by using the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to it.

↑ Back to the top


Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:

↑ Back to the top


More Information

How to obtain help and support for this security update
Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

↑ Back to the top


File information

File hash information
File name SHA1 hash SHA256 hash
WindowsXP-KB4024323-x86-Custom-ENU.exe EDB5A850BCBCC640C2B8C8AAD3AB4D36A3B6FB26 B4788FD116ED4BE6E316F28B0B22D26216B5438EA4C0DD85DD4A5D1E0F413C6A


File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.

Windows XP file information

For all supported x86-based versions
File name File version File size Date Time Platform
Iprtrmgr.dll 5.1.2600.7272 177,152 29-May-2017 04:03 x86
Ndiswan.sys 5.1.2600.7272 91,776 28-May-2017 10:38 x86
Rasctrs.dll 5.1.2600.7272 12,800 29-May-2017 04:03 x86
Rasdlg.dll 5.1.2600.7272 658,432 29-May-2017 04:03 x86
Rasmxs.dll 5.1.2600.7272 25,600 29-May-2017 04:03 x86
Updspapi.dll 6.3.13.0 382,840 19-Jan-2014 05:05 x86

 

↑ Back to the top


Keywords: atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew, kb

↑ Back to the top

Article Info
Article ID : 4024323
Revision : 22
Created on : 4/13/2020
Published on : 4/13/2020
Exists online : False
Views : 416