Lucene search

K
mskbMicrosoftKB4487085
HistoryFeb 15, 2019 - 12:00 a.m.

Description of the security update for the vulnerabilities in Windows Embedded POSReady 2009: February 12, 2019

2019-02-1500:00:00
Microsoft
support.microsoft.com
16

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.186 Low

EPSS

Percentile

96.1%

Description of the security update for the vulnerabilities in Windows Embedded POSReady 2009: February 12, 2019

Notice

This update was rereleased February 15, 2019 to address a known issue that occurred when you installed the original February 12, 2019 version of the update.

Summary

This security update adresses the following vulnerabilities:

Known issues in this security update

After you install the originally released version of this security update (from February 12, 2019), applications that use the msvcrt.dll dynamic link library (DLL) do not load properly. When the problem occurs, you receive error messages that resemble the following (where [SamepleDLLNname] is the application’s DLL):

The procedure entry point sprinttf_s could not be located in the dynamic link library msvcrt.dll.Error loading C:\WINDOWS\system32_[SamepleDLLNname]_.dll

This issue is resolved in the current version of this update which was released February 15, 2019.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website. Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Information about protection and security

  • Protect yourself online: Windows Security support
  • Learn how we guard against cyber threats: Microsoft Security
    File information
    The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

File Information

File hash information

File name SHA1 hash SHA256 hash
WindowsXP-KB4487085-v2-x86-Embedded-ENU.exe 667F051FFE98FF99495E9B6EDE2B8C321ABA1CA3 45999951181B03981DED92600E60EE9E709E0D63184C1EC254CA840510F3CC2E

For all supported x86-based versions

File name File version File size Date Time Platform SP requirement Service branch
Gdiplus.dll 5.2.6002.24561 1,738,240 15-Feb-2019 03:28 x86 None Not applicable
Gdiplus.man Not applicable 398 15-Feb-2019 03:29 Not applicable None Not applicable
Gdiplus.man Not applicable 608 15-Feb-2019 02:29 Not applicable None Not applicable
Mf3216.dll 5.1.2600.7663 43,008 15-Feb-2019 03:28 x86 SP3 SP3QFE
Gdiplus.dll 5.2.6002.24561 1,738,240 15-Feb-2019 03:28 x86 SP3 SP3QFE
Gdiplus.man Not applicable 398 15-Feb-2019 03:29 Not applicable SP3 SP3QFE
Gdiplus.man Not applicable 608 15-Feb-2019 02:29 Not applicable SP3 SP3QFE
Updspapi.dll 6.3.13.0 382,840 01-Feb-2018 21:28 x86 None Not applicable

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

High

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.186 Low

EPSS

Percentile

96.1%