Summary

A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory.

To learn more about the vulnerability, go to CVE-2019-0877.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.
Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.


File information
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

Windows Embedded POSReady 2009 file information

File Information

File hash information

File name

SHA1 hash

SHA256 hash

WindowsXP-KB4493793-x86-Embedded-ENU.exe

C238B0EAB410F55D9B8FDC7485EBA2BA0459559A

21391F0B61433521E4E7475F2013741B2EA1D0784A9CF5EB439E7ED37F5D26FE

For all supported x86-based versions

File name

File version

File size

Date

Time

Platform

Msxbde40.dll

4.0.9801.14

475,648

14-Mar-2019

14:07

x86

Information about protection and security

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Any additional feedback? (Optional)

Thank you for your feedback!

×