Description of the security update for the vulnerabilities in Windows Embedded POSReady 2009: February 12, 2019

2019-02-15T19:18:26
ID KB4487085
Type mskb
Reporter Microsoft
Modified 2019-02-15T20:11:37

Description

<html><body><p>Resolves vulnerabilities in Windows Embedded POSReady 2009 and Windows Embedded Standard 2009.</p><h2>Notice</h2><p>This update was rereleased February 15, 2019 to address a known issue that occurred when you installed the original February 12, 2019 version of the update. </p><h2>Summary</h2><div class="kb-summary-section section">This security update adresses the following vulnerabilities:<ul><li>Remote code execution vulnerabilities exist because of the manner in which the Windows Graphics Device Interface (GDI) handles objects in the memory.</li><li>Information disclosure vulnerabilities exist when the Windows GDI component incorrectly discloses the contents of its memory.</li></ul>To learn more about the vulnerabilities, see the following Common Vulnerabilities and Exposures (CVE).<ul class="sbody-free_list"><li><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0602" id="kb-link-2" target="_self">CVE-2019-0602</a></li><li><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0615" id="kb-link-2" target="_self">CVE-2019-0615</a></li><li><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0616" id="kb-link-2" target="_self">CVE-2019-0616</a></li><li><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0618" id="kb-link-2" target="_self">CVE-2019-0618</a></li><li><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0619" id="kb-link-2" target="_self">CVE-2019-0619</a></li><li><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0660" id="kb-link-2" target="_self">CVE-2019-0660</a></li><li><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0662" id="kb-link-2" target="_self">CVE-2019-0662</a></li><li><a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0664" id="kb-link-2" target="_self">CVE-2019-0664</a></li></ul></div><h2>Known issues in this security update</h2><p>After you install the originally released version of this security update (from February 12, 2019), applications that use the msvcrt.dll dynamic link library (DLL) do not load properly. When the problem occurs, you receive error messages that resemble the following (where <em>[SamepleDLLNname]</em>  is the application's DLL):</p><div class="sbody-error"><p>The procedure entry point sprinttf_s could not be located in the dynamic link library msvcrt.dll.</p><p>Error loading C:\WINDOWS\system32\<em>[SamepleDLLNname]</em>.dll</p></div><p>This issue is resolved in the current version of this update which was released February 15, 2019. </p><h2>How to obtain and install the update</h2><div class="kb-resolution-section section"><h3>Method 1: Windows Update</h3><div class="kb-collapsible kb-collapsible-expanded">This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see <a href="https://support.microsoft.com/help/12373/windows-update-faqx" id="kb-link-13" target="_self">Windows Update: FAQ</a>.</div><h3 class="sbody-h3">Method 2: Microsoft Update Catalog</h3><div class="kb-collapsible kb-collapsible-expanded">To get the standalone package for this update, go to the <a href="http://catalog.update.microsoft.com/v7/site/search.aspx?q=4487085" id="kb-link-14" target="_self">Microsoft Update Catalog</a> website.</div></div><p><strong class="sbody-strong">Important </strong></p><ul class="sbody-free_list"><li>If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see <a href="https://technet.microsoft.com/library/hh825699" id="kb-link-5" target="_self">Add language packs to Windows</a>.</li></ul><h2>Information about protection and security</h2><ul><li>Protect yourself online: <a href="https://support.microsoft.com/hub/4099151/windows-security-help"> Windows Security support</a></li><li>Learn how we guard against cyber threats: <a href="https://www.microsoft.com/security"> Microsoft Security</a></li></ul> <h2>File Information</h2><table class="faq-section" faq-section=""><tbody class="faq-panel"><tr><td faq-panel-heading="">File hash information</td></tr><tr><td faq-panel-body=""><table class="table"><tbody><tr><th>File name</th><th>SHA1 hash</th><th>SHA256 hash</th></tr><tr><td>WindowsXP-KB4487085-v2-x86-Embedded-ENU.exe</td><td>667F051FFE98FF99495E9B6EDE2B8C321ABA1CA3</td><td>45999951181B03981DED92600E60EE9E709E0D63184C1EC254CA840510F3CC2E</td></tr></tbody></table></td></tr></tbody></table><p><strong>File information</strong><br/><span>The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.</span></p><table class="faq-section" faq-section=""><tbody class="faq-panel"><tr><td faq-panel-heading="">For all supported x86-based versions</td></tr><tr><td faq-panel-body=""><table class="table"><tbody><tr><td><strong class="sbody-strong">File name</strong></td><td><strong class="sbody-strong">File version</strong></td><td><strong class="sbody-strong">File size</strong></td><td><strong class="sbody-strong">Date</strong></td><td><strong class="sbody-strong">Time</strong></td><td><strong class="sbody-strong">Platform</strong></td><td><strong class="sbody-strong">SP requirement</strong></td><td><strong class="sbody-strong">Service branch</strong></td></tr><tr><td>Gdiplus.dll</td><td>5.2.6002.24561</td><td>1,738,240</td><td>15-Feb-2019</td><td>03:28</td><td>x86</td><td>None</td><td>Not applicable</td></tr><tr><td>Gdiplus.man</td><td>Not applicable</td><td>398</td><td>15-Feb-2019</td><td>03:29</td><td>Not applicable</td><td>None</td><td>Not applicable</td></tr><tr><td>Gdiplus.man</td><td>Not applicable</td><td>608</td><td>15-Feb-2019</td><td>02:29</td><td>Not applicable</td><td>None</td><td>Not applicable</td></tr><tr><td>Mf3216.dll</td><td>5.1.2600.7663</td><td>43,008</td><td>15-Feb-2019</td><td>03:28</td><td>x86</td><td>SP3</td><td>SP3QFE</td></tr><tr><td>Gdiplus.dll</td><td>5.2.6002.24561</td><td>1,738,240</td><td>15-Feb-2019</td><td>03:28</td><td>x86</td><td>SP3</td><td>SP3QFE</td></tr><tr><td>Gdiplus.man</td><td>Not applicable</td><td>398</td><td>15-Feb-2019</td><td>03:29</td><td>Not applicable</td><td>SP3</td><td>SP3QFE</td></tr><tr><td>Gdiplus.man</td><td>Not applicable</td><td>608</td><td>15-Feb-2019</td><td>02:29</td><td>Not applicable</td><td>SP3</td><td>SP3QFE</td></tr><tr><td>Updspapi.dll</td><td>6.3.13.0</td><td>382,840</td><td>01-Feb-2018</td><td>21:28</td><td>x86</td><td>None</td><td>Not applicable</td></tr></tbody></table></td></tr></tbody></table><p> </p></body></html>