Description of the security update of Windows XP and Windows Server 2003: June 13, 2017

2020-04-13T04:12:04
ID KB4024323
Type mskb
Reporter Microsoft
Modified 2020-04-13T04:15:39

Description

<html><body><p>Resolves vulnerabilities in Windows XP and Windows Server 2003.</p><h2>Summary</h2><div class="kb-summary-section section"><h2><span><span>Windows RPC remote code execution vulnerability</span></span><br/> </h2><p>A remote code execution vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p><p>To exploit this vulnerability, an attacker would need to run a specially crafted application against an RPC server which has Routing and Remote Access enabled. Routing and Remote Access is a non-default configuration; systems without it enabled are not vulnerable.</p><p>The security update addresses the vulnerability by correcting how the Routing and Remote Access service handles requests.</p><p>The following table contains links to the standard entry for each vulnerability in the Common Vulnerabilities and Exposures list:</p><table class="table"><tbody><tr><td width="305"><p><strong>Vulnerability title</strong></p></td><td width="120"><p><strong>CVE number</strong></p></td><td width="126"><p><strong>Publicly disclosed</strong></p></td><td width="72"><p><strong>Exploited</strong></p></td></tr><tr><td width="305"><p>Windows RPC Remote Code Execution Vulnerability</p></td><td width="120"><p><a href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8461"><u>CVE-2017-8461</u></a></p></td><td width="126"><p>Yes</p></td><td width="72"><p>Yes</p></td></tr></tbody></table><p> </p><h3><span lang="EN">Mitigating Factors </span></h3><p>Microsoft has not identified any mitigating factors for this vulnerability.</p><h3><span lang="EN">Workarounds </span></h3><span lang="EN"><span><span>Microsoft has not identified any workarounds for this vulnerability.</span></span></span></div><h2>More Information</h2><div class="kb-moreinformation-section section"><span class="text-base">Important</span><br/> <ul class="sbody-free_list"><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href="https://technet.microsoft.com/en-us/library/hh825699" id="kb-link-5" target="_self">Add language packs to Windows</a>.</li></ul></div><h2>How to obtain and install the update</h2><h3 class="sbody-h3">Method 1: Microsoft Update Catalog</h3><div class="kb-collapsible kb-collapsible-expanded">To get the stand-alone package for this update, go to the <a href="http://catalog.update.microsoft.com/v7/site/search.aspx?q=4024323" id="kb-link-14" target="_self">Microsoft Update Catalog</a> website.</div><div class="kb-resolution-section section"><h3 class="sbody-h3">Method 2: Microsoft Download Center</h3><div class="kb-collapsible kb-collapsible-expanded">The following files are available for download from the Microsoft Download Center.<h4><span><br/><br/>For all x86-based versions of Windows Server 2003</span></h4><a href="http://www.microsoft.com/download/details.aspx?FamilyId=c3baed64-d9cf-409f-ab1e-9345de4fc267"> Download the package now</a><h4><span><br/><br/>For all x64-based versions of Windows Server 2003</span></h4><a href="http://www.microsoft.com/download/details.aspx?FamilyId=4eb40c5b-13c5-4f13-9567-39f9b1a940de "> Download the package now</a><h4><span><br/><br/>For all x86-based versions of Windows XP</span></h4><a href="http://www.microsoft.com/download/details.aspx?FamilyId=991d18a5-ca5a-4ef9-aebc-cb0af8ca3fa5"> Download the package now</a><h4><span><br/><br/>For all x64-based versions of Windows XP</span></h4><a href="http://www.microsoft.com/download/details.aspx?FamilyId=318b5061-57f5-499a-9595-937948a1adcb "> Download the package now</a><h4><span><br/><br/>For all versions of Windows XP Embedded </span></h4><a href="http://www.microsoft.com/download/details.aspx?FamilyId=55bbb6e2-8530-4a61-be56-b0be30ad4b8e"> Download the package now</a><br/><br/>Release Date: June 13, 2017<br/><br/>For more information about how to download Microsoft support files, click the following article number to go to the article in the Microsoft Knowledge Base:<div class="indent"><a href="https://support.microsoft.com/en-us/help/119591" id="kb-link-9">How to obtain Microsoft support files from online services</a></div><h4><span><br/><br/>Virus-scan claim</span></h4>Microsoft scanned this file for viruses by using the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to it.</div></div><h2>Deployment information</h2>For deployment details for this security update, go to the following article in the Microsoft Knowledge Base:<br/> <div class="indent"> <a href="https://support.microsoft.com/en-us/help/20170613" id="kb-link-9">Security update deployment information: June 13, 2017</a></div><h2>More Information</h2><div class="kb-moreinformation-section section"><table class="faq-section" faq-section=""><tbody class="faq-panel"><tr><td faq-panel-heading=""><span class="bold btn-link">How to obtain help and support for this security update</span></td></tr><tr><td faq-panel-body=""><span><div class="kb-collapsible kb-collapsible-collapsed">Help for installing updates: <a href="https://support.microsoft.com/ph/6527" id="kb-link-15" target="_self">Windows Update: FAQ</a><br/><br/>Security solutions for IT professionals: <a href="https://technet.microsoft.com/security/bb980617.aspx" id="kb-link-16" target="_self">TechNet Security Support and Troubleshooting</a><br/><br/>Help for protecting your Windows-based computer from viruses and malware: <a href="https://support.microsoft.com/contactus/cu_sc_virsec_master" id="kb-link-17" target="_self">Microsoft Secure</a><br/><br/>Local support according to your country: <a href="https://www.microsoft.com/en-us/locale.aspx" id="kb-link-18" target="_self">International Support</a></div><br/></span></td></tr></tbody></table><a class="bookmark" id="fileinfo"></a></div><h2>File information</h2><table class="faq-section" faq-section=""><tbody class="faq-panel"><tr><td faq-panel-heading="">File hash information</td></tr><tr><td faq-panel-body=""><table class="table"><tbody><tr><th>File name</th><th>SHA1 hash</th><th>SHA256 hash</th></tr><tr><td>WindowsXP-KB4024323-x86-Custom-ENU.exe</td><td>EDB5A850BCBCC640C2B8C8AAD3AB4D36A3B6FB26</td><td>B4788FD116ED4BE6E316F28B0B22D26216B5438EA4C0DD85DD4A5D1E0F413C6A</td></tr></tbody></table></td></tr></tbody></table><p><br/><strong>File information</strong></p><p><span>The English (United States) version of this software update installs files that have the attributes that are listed in the following tables.</span><br/><br/><strong>Windows XP file information</strong></p><table class="faq-section" faq-section=""><tbody class="faq-panel"><tr><td faq-panel-heading="">For all supported x86-based versions</td></tr><tr><td faq-panel-body=""><table class="table"><tbody><tr><td><strong class="sbody-strong">File name</strong></td><td><strong class="sbody-strong">File version</strong></td><td><strong class="sbody-strong">File size</strong></td><td><strong class="sbody-strong">Date</strong></td><td><strong class="sbody-strong">Time</strong></td><td><strong class="sbody-strong">Platform</strong></td></tr><tr><td>Iprtrmgr.dll</td><td>5.1.2600.7272</td><td>177,152</td><td>29-May-2017</td><td>04:03</td><td>x86</td></tr><tr><td>Ndiswan.sys</td><td>5.1.2600.7272</td><td>91,776</td><td>28-May-2017</td><td>10:38</td><td>x86</td></tr><tr><td>Rasctrs.dll</td><td>5.1.2600.7272</td><td>12,800</td><td>29-May-2017</td><td>04:03</td><td>x86</td></tr><tr><td>Rasdlg.dll</td><td>5.1.2600.7272</td><td>658,432</td><td>29-May-2017</td><td>04:03</td><td>x86</td></tr><tr><td>Rasmxs.dll</td><td>5.1.2600.7272</td><td>25,600</td><td>29-May-2017</td><td>04:03</td><td>x86</td></tr><tr><td>Updspapi.dll</td><td>6.3.13.0</td><td>382,840</td><td>19-Jan-2014</td><td>05:05</td><td>x86</td></tr></tbody></table></td></tr></tbody></table><p> </p></body></html>