Summary
A remote code execution vulnerability exists in the manner in which the VBScript engine handles objects in memory.CVE-2019-0772.
To learn more about the vulnerability, go toHow to obtain and install the update
Method 1: Windows Update
This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.
Method 2: Microsoft Update Catalog
To get the standalone package for this update, go to the Microsoft Update Catalog website.
Important
-
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
Information about protection and security
-
Protect yourself online: Windows Security support
-
Learn how we guard against cyber threats: Microsoft Security
File Information
File hash information
File name |
SHA1 hash |
SHA256 hash |
---|---|---|
WindowsXP-KB4489975-x86-Embedded-ENU.exe |
7AC723A2F7A1996B6DEFEF1EE38C720A74993AFB |
378F442B5DB4ACE3846475834B81A79E8F0B51EC90D6850D2B81DE14E50FA787 |
Windows XP file information
For all supported x86-based versions
File name |
File version |
File size |
Date |
Time |
Platform |
Msxml6.dll |
6.20.2508.0 |
1,448,960 |
09-Feb-2019 |
00:40 |
x86 |