Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update for the vulnerabilities in Windows Embedded POSReady 2009: February 12, 2019


View products that this article applies to.

Notice

This update was rereleased February 15, 2019 to address a known issue that occurred when you installed the original February 12, 2019 version of the update. 

↑ Back to the top


Summary

This security update adresses the following vulnerabilities:
  • Remote code execution vulnerabilities exist because of the manner in which the Windows Graphics Device Interface (GDI) handles objects in the memory.
  • Information disclosure vulnerabilities exist when the Windows GDI component incorrectly discloses the contents of its memory.
To learn more about the vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE).

↑ Back to the top


Known issues in this security update

After you install the originally released version of this security update (from February 12, 2019), applications that use the msvcrt.dll dynamic link library (DLL) do not load properly. When the problem occurs, you receive error messages that resemble the following (where [SamepleDLLNname]  is the application's DLL):

The procedure entry point sprinttf_s could not be located in the dynamic link library msvcrt.dll.

Error loading C:\WINDOWS\system32\[SamepleDLLNname].dll

This issue is resolved in the current version of this update which was released February 15, 2019. 

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


Information about protection and security

↑ Back to the top


File Information

File hash information
File name SHA1 hash SHA256 hash
WindowsXP-KB4487085-v2-x86-Embedded-ENU.exe 667F051FFE98FF99495E9B6EDE2B8C321ABA1CA3 45999951181B03981DED92600E60EE9E709E0D63184C1EC254CA840510F3CC2E

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

For all supported x86-based versions
File name File version File size Date Time Platform SP requirement Service branch
Gdiplus.dll 5.2.6002.24561 1,738,240 15-Feb-2019 03:28 x86 None Not applicable
Gdiplus.man Not applicable 398 15-Feb-2019 03:29 Not applicable None Not applicable
Gdiplus.man Not applicable 608 15-Feb-2019 02:29 Not applicable None Not applicable
Mf3216.dll 5.1.2600.7663 43,008 15-Feb-2019 03:28 x86 SP3 SP3QFE
Gdiplus.dll 5.2.6002.24561 1,738,240 15-Feb-2019 03:28 x86 SP3 SP3QFE
Gdiplus.man Not applicable 398 15-Feb-2019 03:29 Not applicable SP3 SP3QFE
Gdiplus.man Not applicable 608 15-Feb-2019 02:29 Not applicable SP3 SP3QFE
Updspapi.dll 6.3.13.0 382,840 01-Feb-2018 21:28 x86 None Not applicable

 

↑ Back to the top


Keywords: kbsurveynew, kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, kbexpertiseinter, kblangall, kbfix, kb, kbbug, atdownload, kbmustloc

↑ Back to the top

Article Info
Article ID : 4487085
Revision : 17
Created on : 2/15/2019
Published on : 2/15/2019
Exists online : False
Views : 249