You are currently offline, waiting for your internet to reconnect

MS13-032: Description of the security update for Active Directory Application Mode (ADAM): April 9, 2013

Support for Windows XP has ended

Microsoft ended support for Windows XP on April 8, 2014. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

INTRODUCTION
Microsoft has released security bulletin MS13-032. To view the complete security bulletin, go to one of the following Microsoft websites:

How to obtain help and support for this security update

Help installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help protect your Windows-based computer from viruses and malware: Virus Solution and Security Center

Local support according to your country: International Support

FILE INFORMATION
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.
Windows XP and Windows Server 2003 file information
  • The files that apply to a specific milestone (SPn) and service branch (QFE, GDR) are noted in the "SP requirement" and "Service branch" columns.
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.
  • In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KBnumber.cat) that is signed with a Microsoft digital signature.

For all supported x86-based versions of Windows XP

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Spuninst.exe6.3.13.0231,28805-Jul-201013:15x86NoneNot applicable
Adambsrv_xp.dll1.1.3790.513149,15201-Mar-201319:59x86SP3SP3GDR
Adamdsa.dll1.1.3790.51311,636,35201-Mar-201319:59x86SP3SP3GDR
Ntdsatq.dll1.1.3790.512228,16001-Mar-201319:59x86SP3SP3GDR
Xpsp4res.dll5.1.2600.63496,14407-Feb-201300:37x86SP3SP3GDR
Adambsrv_xp.dll1.1.3790.513149,15201-Mar-201319:58x86SP3SP3QFE
Adamdsa.dll1.1.3790.51311,637,37601-Mar-201319:58x86SP3SP3QFE
Ntdsatq.dll1.1.3790.512228,16001-Mar-201319:58x86SP3SP3QFE
Xpsp4res.dll5.1.2600.63496,14407-Feb-201300:37x86SP3SP3QFE

For all supported x64-based versions of Windows Server 2003 and of Windows XP Professional x64 edition

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Spuninst.exe6.3.4.1293,16830-Mar-201304:33x64NoneNot applicable
Adamdsa.dll1.1.3790.51313,032,06430-Mar-201304:31x64SP2SP2GDR
W03a3409.dll5.2.3790.511546,08030-Mar-201304:31x64SP2SP2GDR
Adambsrv.dll1.1.3790.513187,55230-Mar-201304:31x64SP2SP2GDR\IA
Ntdsatq.r2.dll1.1.3790.513143,52030-Mar-201304:31x64SP2SP2GDR\IA
Adambsrv.dll1.1.3790.513187,55230-Mar-201304:31x64SP2SP2GDR\ID
Ntdsatq.r2.dll1.1.3790.513143,52030-Mar-201304:31x64SP2SP2GDR\ID
Adambsrv.dll1.1.3790.513187,55230-Mar-201304:31x64SP2SP2GDR\IS
Ntdsatq.r2.dll1.1.3790.513143,52030-Mar-201304:31x64SP2SP2GDR\IS
Ww03a3409.dll5.2.3790.511545,56830-Mar-201304:31x86SP2SP2GDR\WOW
Adamdsa.dll1.1.3790.51313,034,11230-Mar-201304:26x64SP2SP2QFE
Ntdsatq.r2.dll1.1.3790.513143,52030-Mar-201304:26x64SP2SP2QFE
W03a3409.dll5.2.3790.511546,08030-Mar-201304:26x64SP2SP2QFE
Adambsrv.dll1.1.3790.513187,55230-Mar-201304:26x64SP2SP2QFE\IA
Adambsrv.dll1.1.3790.513187,55230-Mar-201304:26x64SP2SP2QFE\ID
Adambsrv.dll1.1.3790.513187,55230-Mar-201304:26x64SP2SP2QFE\IS
Ww03a3409.dll5.2.3790.511545,56830-Mar-201304:26x86SP2SP2QFE\WOW

For all supported x86-based versions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Spuninst.exe6.3.4.1221,48807-Jul-201015:19x86NoneNot applicable
Adamdsa.dll1.1.3790.51311,636,35226-Feb-201305:21x86SP2SP2GDR
W03a3409.dll5.2.3790.511545,56830-Jan-201300:51x86SP2SP2GDR
Adambsrv.dll1.1.3790.513167,58426-Feb-201305:21x86SP2SP2GDR\IA
Ntdsatq.r2.dll1.1.3790.513128,16026-Feb-201305:21x86SP2SP2GDR\IA
Adambsrv.dll1.1.3790.513167,58426-Feb-201305:21x86SP2SP2GDR\ID
Ntdsatq.r2.dll1.1.3790.513128,16026-Feb-201305:21x86SP2SP2GDR\ID
Adambsrv.dll1.1.3790.513167,58426-Feb-201305:21x86SP2SP2GDR\IS
Ntdsatq.r2.dll1.1.3790.513128,16026-Feb-201305:21x86SP2SP2GDR\IS
Adamdsa.dll1.1.3790.51311,637,37626-Feb-201305:20x86SP2SP2QFE
Ntdsatq.r2.dll1.1.3790.513128,16026-Feb-201305:20x86SP2SP2QFE
W03a3409.dll5.2.3790.511545,56830-Jan-201300:51x86SP2SP2QFE
Adambsrv.dll1.1.3790.513167,58426-Feb-201305:20x86SP2SP2QFE\IA
Adambsrv.dll1.1.3790.513167,58426-Feb-201305:20x86SP2SP2QFE\ID
Adambsrv.dll1.1.3790.513167,58426-Feb-201305:20x86SP2SP2QFE\IS
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE
Properties

Article ID: 2801109 - Last Review: 04/09/2013 17:07:00 - Revision: 1.0

Microsoft Windows Server 2003 Service Pack 2, Microsoft Windows XP Service Pack 3

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability KB2801109
Feedback
varAutoFirePV = 1; var varClickTracking = 1; var varCustomerTracking = 1; var Route = "76500"; var Ctrl = ""; document.write(" eScreens track by $index" class="col-sm-6 col-xs-24 ng-scope"> Paraguay - Español
Venezuela - Español
://c1.microsoft.com/c.gif?DI=4050&did=1&t=">&did=1&t=">; var Route = "76500"; var Ctrl = ""; document.write(" 0&did=1&t=">r m=document.createElement('meta');m.name='ms.dqp0';m.content='false';document.getElementsByTagName('head')[0].appendChild(m);" src="http://c1.microsoft.com/c.gif?"> >