Lucene search

K
mskbMicrosoftKB4093257
HistoryApr 10, 2018 - 7:00 a.m.

Description of the security update for vulnerabilities in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009: April 10, 2018

2018-04-1007:00:00
Microsoft
support.microsoft.com
18

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.266

Percentile

96.8%

Description of the security update for vulnerabilities in Windows Server 2008, Windows Embedded POSReady 2009, and Windows Embedded Standard 2009: April 10, 2018

Summary

  • A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system.

  • An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory.
    To learn more about the vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE):

  • CVE-2018-1003

  • CVE-2018-1008

More Information

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

Deployment information

For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:
Security update deployment information: April 10, 2018

More Information

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

**Note:**The MANIFEST files (.manifest) and MUM files (.mum) that are installed are not listed.

File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight-saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

How to obtain help and support for this security update

Help for installing updates: Windows Update: FAQ

Security solutions for IT professionals: TechNet Security Support and Troubleshooting

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

Windows Server 2008 file information

File hash information

File name SHA1 hash SHA256 hash
Windows6.0-KB4093257-x86.msu 5F8E016967491F797547586D7569F513CAFFB760 288636C68863D50097BB77D78E254F6D29BA6583EA2C54CAB198C84DE2B3DB9B
Windows6.0-KB4093257-x64.msu 7A3DB0BAF118AE22EE2046B80F51D93E74C03053 6FC4A3522291CC4488E64C5948A214611D70A3C3F661877E6EF7A52525A787B7

For all supported x86-based versions

File name File version File size Date Time Platform
Msexcl40.dll 4.0.9801.3 340,480 09-Mar-2018 19:06 x86

For all supported x64-based versions

File name File version File size Date Time Platform
Msexcl40.dll 4.0.9801.3 340,480 09-Mar-2018 19:06 x86

Windows Embedded POSReady 2009 and Windows Embedded Standard 2009 file information

File hash information

File name SHA1 hash SHA256 hash
WindowsXP-KB4093257-x86-Embedded-ENU.exe 9C72FC51BE7A7EB68E2C603B309A9C0163949CB8 83BEB058247FADDA8AABE50CF6C14F0A7FADE5B2A104C9DE57570BBB07DF1C84

For all supported x86-based versions

File name File version File size Date Time Platform
Msexcl40.dll 4.0.9801.3 340,480 10-Mar-2018 15:01 x86
Updspapi.dll 6.3.13.0 382,840 16-May-2014 03:08 x86

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.266

Percentile

96.8%