Lucene search

K
mskbMicrosoftKB4486465
HistoryFeb 08, 2019 - 12:00 a.m.

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009: February 12, 2019

2019-02-0800:00:00
Microsoft
support.microsoft.com
18

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.662 Medium

EPSS

Percentile

97.9%

Description of the security update for the remote code execution vulnerability in Windows Embedded POSReady 2009: February 12, 2019

Summary

A remote code execution vulnerability exists because of the manner in which the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests.

To learn more about the vulnerability, see CVE-2019-0630.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website. Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Information about protection and security

  • Protect yourself online: Windows Security support
  • Learn how we guard against cyber threats: Microsoft Security
    File information
    The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

File Information

File hash information

File name SHA1 hash SHA256 hash
WindowsXP-KB4486465-x86-Embedded-ENU.exe 80C4F32ABD257968871A840FD4D87CFEDD0B3D4B EF59B0337A00F7BB55DD5202FADC312D64B73098D5102E5C452CF1AF9758C2C0

For all supported x86-based versions

File name File version File size Date Time Platform SP requirement Service branch
Srv.sys 5.1.2600.7651 359,552 11-Jan-2019 02:20 x86 SP3 SP3QFE
Xpsp4res.dll 5.1.2600.7651 7,168 11-Jan-2019 01:56 x86 SP3 SP3QFE
Updspapi.dll 6.3.13.0 382,840 01-Feb-2018 21:28 x86 None Not applicable

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.662 Medium

EPSS

Percentile

97.9%