Description of the security update for the Windows DNSAPI remote code execution vulnerability in Windows Embedded POSReady 2009, and Windows Embedded Standard 2009: June 12, 2018

Applies to: Windows Embedded Standard 2009Windows Embedded POSReady 2009

Summary


A remote code execution vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to properly handle DNS responses.

To learn more about the vulnerability, go to CVE-2018-8225. For more information, see the Security Update Guide.

How to obtain and install the update


Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the stand-alone package for this update, go to the Microsoft Update Catalog website.

More Information


Windows Embedded POSReady 2009 and Windows Embedded Standard 2009 file information



File information

The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows XP file information