Lucene search

K
mskbMicrosoftKB4458001
HistorySep 11, 2018 - 12:00 a.m.

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009 and Windows Embedded Standard 2009: September 11, 2018

2018-09-1100:00:00
Microsoft
support.microsoft.com
11

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.303 Low

EPSS

Percentile

96.9%

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009 and Windows Embedded Standard 2009: September 11, 2018

Summary

A remote code execution vulnerability exists when the Windows font library handles specially crafted embedded fonts incorrectly. An attacker who successfully exploits this vulnerability could take control of the affected system.

To learn more about the vulnerability, go to CVE-2018-8332.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website. Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

More Information

File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

How to obtain help and support for this security update

Help for installing updates: Windows Update: FAQ

Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure

Local support according to your country: International Support

File Information

File hash information

File name SHA1 hash SHA256 hash
WindowsXP-KB4458001-x86-Embedded-ENU.exe B6AE71B9B58128D4C6A3221208C1E42D0D434F79 C819331CEB6831059F28CDCF80BE2203C9D0B3CC44B9FBC23215D58132F61598

For all supported x86-based versions

File name File version File size Date Time Platform SP requirement Service branch
Fontsub.dll 5.1.2600.7563 82,432 22-Aug-2018 23:34 x86 SP3 SP3QFE
T2embed.dll 5.1.2600.7563 122,880 22-Aug-2018 23:34 x86 SP3 SP3QFE
Updspapi.dll 6.3.13.0 382,840 31-Jan-2018 18:26 x86 None Not applicable

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.7 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.303 Low

EPSS

Percentile

96.9%