You are currently offline, waiting for your internet to reconnect

MS11-093: Vulnerability in OLE could allow remote code execution: December 13, 2011

Support for Windows XP has ended

Microsoft ended support for Windows XP on April 8, 2014. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

INTRODUCTION
Microsoft has released security bulletin MS11-093. To view the complete security bulletin, visit one of the following Microsoft websites:

How to obtain help and support for this security update

Help installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help protect your computer that is running Windows from viruses and malware:Virus Solution and Security Center

Local support according to your country: International Support

FILE INFORMATION
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows XP and Windows Server 2003 file information

  • The files that apply to a specific milestone (SPn) and service branch (QFE, GDR) are noted in the "SP requirement" and "Service branch" columns.
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.
  • In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KBnumber.cat) that is signed with a Microsoft digital signature.

For all supported x86-based versions of Windows XP

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Ole32.dll5.1.2600.61681,288,70401-Nov-201116:07x86SP3SP3GDR
Ole32.dll5.1.2600.61681,289,21601-Nov-201116:05x86SP3SP3QFE

For all supported x64-based versions of Windows Server 2003 and of Windows XP Professional x64 edition

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Ole32.dll5.2.3790.49262,624,00002-Nov-201121:36x64SP2SP2GDR
Wole32.dll5.2.3790.49261,267,71202-Nov-201121:36x86SP2SP2GDR\WOW
Ole32.dll5.2.3790.49262,627,07202-Nov-201121:33x64SP2SP2QFE
Wole32.dll5.2.3790.49261,270,27202-Nov-201121:33x86SP2SP2QFE\WOW

For all supported x86-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Ole32.dll5.2.3790.49261,267,71201-Nov-201117:32x86SP2SP2GDR
Ole32.dll5.2.3790.49261,270,27201-Nov-201117:31x86SP2SP2QFE

For all supported IA-64-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Ole32.dll5.2.3790.49264,098,04802-Nov-201121:37IA-64SP2SP2GDR
Wole32.dll5.2.3790.49261,267,71202-Nov-201121:37x86SP2SP2GDR\WOW
Ole32.dll5.2.3790.49264,103,16802-Nov-201121:33IA-64SP2SP2QFE
Wole32.dll5.2.3790.49261,270,27202-Nov-201121:33x86SP2SP2QFE\WOW
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE
Properties

Article ID: 2624667 - Last Review: 05/08/2012 15:58:00 - Revision: 3.0

Microsoft Windows Server 2003 Service Pack 2, Microsoft Windows XP Service Pack 3

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB2624667
Feedback
var varCustomerTracking = 1; var Route = "76500"; var Ctrl = ""; document.write(" html>>