Lucene search

K
mskbMicrosoftKB4490228
HistoryMar 12, 2019 - 12:00 a.m.

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009: March 12, 2019

2019-03-1200:00:00
Microsoft
support.microsoft.com
28

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.048

Percentile

92.9%

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009: March 12, 2019

Summary

A remote code execution vulnerability exists when Internet Explorer incorrectly accesses objects in memory.

To learn more about the vulnerability, go to CVE-2019-0765.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.
Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Information about protection and security

File Information

File hash information

File name SHA1 hash SHA256 hash
WindowsXP-KB4490228-x86-Embedded-ENU.exe A81C03F3F775390169D890D6F99CD9D3E58CC62E C02251DC52A8164F8DC2EF7481F1817C3BE2DB3C1CC46CA228578FA2B44DDFA6
Windows XP file information

For all supported x86-based versions

File name File version File size Date Time Platform SP requirement Service branch
Comctl32.dll 6.0.2900.7660 1,054,208 09-Feb-2019 00:26 x86 None Not applicable
Controls.man Not applicable 1,862 09-Feb-2019 00:31 Not applicable None Not applicable
Comctl.man Not applicable 621 09-Feb-2019 00:31 Not applicable None Not applicable
Comctl32.dll 6.0.2900.7660 1,054,208 09-Feb-2019 00:26 x86 SP3 SP3QFE
Controls.man Not applicable 1,862 09-Feb-2019 00:31 Not applicable SP3 SP3QFE
Comctl.man Not applicable 621 09-Feb-2019 00:31 Not applicable SP3 SP3QFE

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.8

Confidence

High

EPSS

0.048

Percentile

92.9%