Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS10-066: Vulnerability in remote procedure call could allow remote code execution


View products that this article applies to.

INTRODUCTION

Microsoft has released security bulletin MS10-066. To view the complete security bulletin, visit one of the following Microsoft websites:

How to obtain help and support for this security update


Help installing updates:
Support for Microsoft Update

Security solutions for IT professionals:
TechNet Security Troubleshooting and Support

Help protect your computer that is running Windows from viruses and malware:
Virus Solution and Security Center

Local support according to your country:
International Support

↑ Back to the top


More Information

Known issues with this security update

  • After you install this security update on a Windows XP SP3-based computer, a mapped to a network drive may not be displayed correctly. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
    2454533 Description of a shared folder that is mapped to a network drive is not displayed on a Windows XP SP3-based computer that has security update MS10-066 installed
  • After you install this security update on a Windows Server 2003-based computer, certain applications or services that use remote procedure call (RPC) functions crash. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
    2480093 Applications or services that use RPC functions crash on a Windows Server 2003-based computer after you install Microsoft security update MS10-066

↑ Back to the top


FILE INFORMATION





The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows XP and Windows Server 2003 file information

  • The files that apply to a specific milestone (RTM, SPn) and service branch (QFE, GDR) are noted in the "SP requirement" and "Service branch" columns.
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.
  • In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KBnumber.cat) that is signed with a Microsoft digital signature.

For all supported x86-based versions of Windows XP

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Rpcrt4.dll5.1.2600.6015590,84822-Jul-201015:49x86SP3SP3GDR
Xpsp4res.dll5.1.2600.60155,12022-Jul-201005:57x86SP3SP3GDR
Rpcrt4.dll5.1.2600.6015590,84823-Jul-201006:13x86SP3SP3QFE
Xpsp4res.dll5.1.2600.60155,12022-Jul-201005:57x86SP3SP3QFE

For all supported x64-based versions of Windows Server 2003 and of Windows XP Professional x64 edition

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Rpcrt4.dll5.2.3790.47501,676,80026-Jul-201022:18x64SP2SP2GDR
W03a3409.dll5.2.3790.475045,05626-Jul-201022:18x64SP2SP2GDR
Wrpcrt4.dll5.2.3790.4750634,36826-Jul-201022:18x86SP2SP2GDR\WOW
Ww03a3409.dll5.2.3790.475044,54426-Jul-201022:18x86SP2SP2GDR\WOW
Rpcrt4.dll5.2.3790.47501,703,42426-Jul-201022:14x64SP2SP2QFE
W03a3409.dll5.2.3790.475045,05626-Jul-201022:14x64SP2SP2QFE
Wrpcrt4.dll5.2.3790.4750634,36826-Jul-201022:14x86SP2SP2QFE\WOW
Ww03a3409.dll5.2.3790.475044,54426-Jul-201022:14x86SP2SP2QFE\WOW

For all supported x86-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Rpcrt4.dll5.2.3790.4750647,16826-Jul-201009:08x86SP2SP2GDR
W03a3409.dll5.2.3790.475044,54423-Jul-201012:53x86SP2SP2GDR
Rpcrt4.dll5.2.3790.4750647,68026-Jul-201009:21x86SP2SP2QFE
W03a3409.dll5.2.3790.475044,54423-Jul-201012:53x86SP2SP2QFE

For all supported IA-64-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Rpcrt4.dll5.2.3790.47502,501,63226-Jul-201022:16IA-64SP2SP2GDR
W03a3409.dll5.2.3790.475043,52026-Jul-201022:16IA-64SP2SP2GDR
Wrpcrt4.dll5.2.3790.4750634,36826-Jul-201022:16x86SP2SP2GDR\WOW
Ww03a3409.dll5.2.3790.475044,54426-Jul-201022:16x86SP2SP2GDR\WOW
Rpcrt4.dll5.2.3790.47502,741,76026-Jul-201022:13IA-64SP2SP2QFE
W03a3409.dll5.2.3790.475043,52026-Jul-201022:13IA-64SP2SP2QFE
Wrpcrt4.dll5.2.3790.4750634,36826-Jul-201022:13x86SP2SP2QFE\WOW
Ww03a3409.dll5.2.3790.475044,54426-Jul-201022:13x86SP2SP2QFE\WOW

↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 982802
Revision : 1
Created on : 1/7/2017
Published on : 6/21/2014
Exists online : False
Views : 223