Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009: April 9, 2019


View products that this article applies to.

Summary

A remote code execution vulnerability exists in the manner in which the VBScript engine handles objects in memory.

To learn more about the vulnerability, go to CVE-2019-0842.

↑ Back to the top


How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.
 

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

↑ Back to the top


Information about protection and security

↑ Back to the top


File information

File hash information
File name SHA1 hash SHA256 hash
WindowsXP-KB4493563-x86-Embedded-ENU.exe B7ACBE01322CA903C920FA8A85328057BA2D9703 4CD908C3E1022B439081493383F8CD5EE3F73079169680697C3929C87E494A7C


File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

Windows Embedded POSReady 2009 file information

For all supported x86-based versions
File name File version File size Date Time Platform SP requirement Service branch
Kernel32.dll 5.1.2600.7682 993,792 19-Mar-2019 18:39 x86 SP3 SP3QFE
Ntdll.dll 5.1.2600.7682 720,384 19-Mar-2019 18:39 x86 SP3 SP3QFE
Ole32.dll 5.1.2600.7682 1,299,968 19-Mar-2019 03:39 x86 SP3 SP3QFE
Oleaut32.dll 5.1.2600.7682 563,200 19-Mar-2019 18:39 x86 SP3 SP3QFE
Rpcss.dll 5.1.2600.7682 404,480 19-Mar-2019 18:39 x86 SP3 SP3QFE

 

↑ Back to the top


Keywords: kbsurveynew, kbsecvulnerability, kbsecurity, kbsecreview, kbsecbulletin, kbmustloc, kbexpertiseinter, kbfix, kb, kbbug, atdownload, kbSupportTopic, Vulnerabilities/exploits/security bulletins, kblangall

↑ Back to the top

Article Info
Article ID : 4493563
Revision : 9
Created on : 4/9/2019
Published on : 4/9/2019
Exists online : False
Views : 216