Lucene search

K
mskbMicrosoftKB4493790
HistoryApr 09, 2019 - 12:00 a.m.

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009: April 9, 2019

2019-04-0900:00:00
Microsoft
support.microsoft.com
22

8.8 High

AI Score

Confidence

High

0.031 Low

EPSS

Percentile

91.1%

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009: April 9, 2019

Summary

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input.

To learn more about the vulnerability, go to CVE-2019-0792.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.
Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Information about protection and security

File information

File hash information

File name SHA1 hash SHA256 hash
WindowsXP-KB4493790-x86-Embedded-ENU.exe E078DA675E389CBFABA2354EAE8040E438A42476 62B24B568BA6E83C18879584F1189AF4D93A1598AB9C9DE63D78B5E3065E67F3
Windows Embedded POSReady 2009 file information

For all supported x86-based versions

File name File version File size Date Time Platform SP requirement Service branch
Msxml3.dll 8.100.1065.0 1,176,576 11-Mar-2019 14:21 x86 SP3 SP3QFE
Msxml6.dll 6.20.2509.0 1,449,472 11-Mar-2019 14:21 x86 SP3 SP3QFE

8.8 High

AI Score

Confidence

High

0.031 Low

EPSS

Percentile

91.1%