Microsoft Security Advisory: Vulnerability in Microsoft XML Core Services could allow remote code execution
The Fix it solution that this article describes has been replaced by the Fix it solution that is described in Microsoft Knowledge Base article 2722479. For more information, go to the following Microsoft website:
2722479 12-043: Vulnerability in Microsoft XML Core Services could allow remote code execution: August 14, 2012
Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft website:
The security advisory provides more information about the issue and includes the following:
- The scenarios in which you might apply or disable the workarounds
- Mitigating factors
The Fix it solution described in this section is not intended to be a replacement for any security update. We recommend that you always install the latest security updates. However, we offer this Fix it solution as a workaround option for some scenarios.
Fix it for me
For more information about this workaround, visit the following Microsoft Security Advisory webpage:
- The scenarios in which you might apply or disable the workaround.
- How to manually apply the workaround.
Fix it solution for MSXML version 3, MSXML version 4, or MSXML version 6To enable or disable these Fix it solutions, click the Fix it button or link under the Enable heading or under the Disable heading. Click Run in the File Download dialog box, and then follow the steps in the Fix it wizard.
Fix it solution for MSXML version 5To enable or disable this fixit solution, click the Fix it button or link under the Enable heading or under the Disable heading. Click Run in the File Download dialog box, and then follow the steps in the Fix it wizard.
- These wizards may be in English only. However, the automatic fixes also work for other language versions of Windows.
- If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem.
- If you want to run a quiet installation of this Fix it solution, follow these steps:
- Open a command line with administrator credentials.
- Type the following command, and then press Enter:msiexec /i MicrosoftFixit50897.msi /quiet
Deploying an application compatibility database across multiple computersTo deploy an application compatibility database across multiple computers, you can use a system management solution, such as Microsoft System Center Configuration Manager 2007, and then use the SDBInst.exe command-line tool to install the database. For detailed information about how to use the SDBInst application, go to the following TechNet webpage:
Note For more information about command-line options for installing this fix, see the following MSDN webpage:
- Extract the CAB file from the Fix it package. To do this, type the following command at a command prompt: msidb.exe -x CabFile -d MicrosoftFixit50897.msiNote Msidb.exe is part of Windows Installer Development Tools. For more information, go to the following Microsoft webpage:
- Extract the SDB files from CabFile by using any CAB extraction utility: extract.exe /E CabFile
- Use SDBInst to apply the previously extracted .sdb files. To do this, type the following command at a command prompt:SDBInst -p Path_of_sdb_file\FileName.sdb
File hash tableThe following table lists the thumbprints of the certificates that are used to sign the .sdb files. Verify the certificate thumbprint in this table against the certificate thumbprint that is indicated on the .sdb that you extracted.
File Name Hash information msxml3_shim32.sdb (SHA1 FC673C013DE2D40D03FD2EFC94D0B9965BAA3253) msxml3_shim64.sdb (SHA1 45431F80CE38BBB14FCB107E87F5DD22CCE203A1) msxml4_shim32.sdb (SHA1 FE29173CAC4EFC68FF51E8EC04369044C4687AAF) msxml5_shim32.sdb (SHA1 33abdc0e4cfaa040cf0ff1a29bead2878fcd7673) msxml5_shim64.sdb (SHA1 c7c97f97f3895f69ba217908750ed61fa69390e9) msxml6_shim32.sdb (SHA1 6E69B741CD4CEF05F5B9FFB47B748EE97264131C) msxml6_shim64.sdb (SHA1 273BDFCBDBFE3D24B7F5D3586AF54BD0A93A6E63)
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE
Article ID: 2719615 - Last Review: 10/01/2012 21:39:00 - Revision: 5.0
Windows 7 Service Pack 1, Windows 7 Enterprise, Windows 7 Professional, Windows 7 Ultimate, Windows 7 Home Premium, Windows 7 Home Basic, Windows Server 2008 R2 Service Pack 1, Windows Server 2008 R2 Standard, Windows Server 2008 R2 Enterprise, Windows Server 2008 R2 Datacenter, Windows Server 2008 Service Pack 2, Windows Server 2008 for Itanium-Based Systems, Windows Server 2008 Datacenter, Windows Server 2008 Enterprise, Windows Server 2008 Standard, Windows Web Server 2008, Windows Vista Service Pack 2, Windows Vista Service Pack 1, Microsoft Windows Server 2003 Service Pack 2, Microsoft Windows XP Service Pack 3, Microsoft Office 2003 Service Pack 3, 2007 Microsoft Office Suite Service Pack 2, 2007 Microsoft Office Suite Service Pack 3
- kbexpertiseinter kbinfo kbsecadvisory kbsecurity kbsecvulnerability kbmsifixme kbfixme KB2719615