Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Update rollup includes a security update for Windows Embedded Compact 2013 (August 2017)


View products that this article applies to.

An update rollup is available for Windows Embedded Compact 2013. This rollup resolves the security issues that are described in the following articles:

  • CVE-2017-8527 | Windows Graphics Remote Code Execution Vulnerability
  • CVE-2017-8534 | Windows Uniscribe Information Disclosure Vulnerability
  • CVE-2017-0287 | Windows Graphics Information Disclosure Vulnerability
  • CVE-2017-0283 | Windows Uniscribe Remote Code Execution Vulnerability
  • CVE-2017-0285 | Windows Uniscribe Information Disclosure Vulnerability
  • CVE-2017-8532 | Windows Graphics Information Disclosure Vulnerability
  • CVE-2017-0284 | Windows Uniscribe Information Disclosure Vulnerability
  • CVE-2017-0289 | Windows Graphics Information Disclosure Vulnerability
  • CVE-2017-0282 | Windows Uniscribe Information Disclosure Vulnerability
  • CVE-2017-0288 | Windows Graphics Information Disclosure Vulnerability
  • CVE-2017-0286 | Windows Graphics Information Disclosure Vulnerability
  • CVE-2017-8531 | Windows Graphics Information Disclosure Vulnerability
  • CVE-2017-8528 | Windows Uniscribe Remote Code Execution Vulnerability

↑ Back to the top


More Information

Software update information

Download information

The Windows Embedded Compact 2013 monthly update for August 2017 is now available from Microsoft. To download this Windows Embedded Compact 2013 monthly update, go to Microsoft OEM Online or MyOEM.

Prerequisites

This update is supported only if all previously issued updates for this product were also installed.

Restart requirement

After you apply this update, you must perform a clean build of the whole platform. To do this, use one of the following methods:

  • On the Build menu, click Clean Solution, and then click Build Solution.
  • On the Build menu, click Rebuild Solution.

You don't have to restart the computer after you apply this software update.

Update replacement information

This update doesn't replace any other updates.

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Files that are included in this hotfix package
File name File size Date Time Path
Otls.rel 59,643 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Shaping.map 105,548 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Uspce.rel 125,038 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Otls.map 119,120 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Shaping.dll 200,704 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Otls.dll 122,880 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Shaping.rel 56,424 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Uspce.dll 458,752 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Uspce.map 241,604 10-Aug-2017 11:59 Public\Common\Oak\Target\X86\Checked
Otls.rel 3,528 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Shaping.map 62,475 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Uspce.rel 68,082 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Otls.map 59,528 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Shaping.dll 167,936 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Otls.dll 73,728 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Shaping.rel 22,262 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Uspce.dll 397,312 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Uspce.map 146,229 10-Aug-2017 12:00 Public\Common\Oak\Target\X86\Retail
Otls.rel 82,321 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Shaping.map 108,421 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Uspce.rel 151,283 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Otls.map 119,339 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Shaping.dll 270,336 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Otls.dll 167,936 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Shaping.rel 73,563 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Uspce.dll 659,456 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Uspce.map 249,315 10-Aug-2017 11:58 Public\Common\Oak\Target\X86\Debug
Otls.rel 49,696 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Shaping.map 344,622 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Uspce.rel 80,842 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Otls.map 381,195 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Shaping.dll 192,512 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Otls.dll 131,072 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Shaping.rel 39,894 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Uspce.dll 434,176 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Uspce.map 496,814 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Checked
Otls.rel 2,368 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Shaping.map 121,684 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Uspce.rel 47,173 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Otls.map 83,087 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Shaping.dll 159,744 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Otls.dll 77,824 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Shaping.rel 17,390 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Uspce.dll 368,640 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Uspce.map 266,802 10-Aug-2017 11:59 Public\Common\Oak\Target\Armv7\Retail
Otls.rel 43,722 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug
Shaping.map 521,998 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug
Uspce.rel 80,668 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug
Otls.map 532,561 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug
Shaping.dll 249,856 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug
Otls.dll 180,224 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug
Shaping.rel 35,167 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug
Uspce.dll 626,688 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug
Uspce.map 669,178 10-Aug-2017 11:58 Public\Common\Oak\Target\Armv7\Debug

↑ Back to the top


Status

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.

↑ Back to the top


References

Learn about the terminology that Microsoft uses to describe software updates.

↑ Back to the top


Keywords: kbsecurity, kblangall, kbmustloc, kbsecvulnerability, kbsecbulletin, kbexpertiseinter, kb, kbsurveynew, kbfix, kbnofix, kbsecreview

↑ Back to the top

Article Info
Article ID : 4039149
Revision : 8
Created on : 9/11/2017
Published on : 9/12/2017
Exists online : False
Views : 204