MS08-050: Description of the update for Windows Messenger 4.7 for Windows Server 2003: August 12, 2008

Support for Windows XP has ended

Microsoft ended support for Windows XP on April 8, 2014. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

This article has been archived. It is offered "as is" and will no longer be updated.
INTRODUCTION
Microsoft has released security bulletin MS08-050. To view the complete security bulletin, visit one of the following Microsoft Web sites:

How to obtain help and support for this security update

Help installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help protect your computer that is running Windows from viruses and malware:Virus Solution and Security Center

Local support according to your country: International Support

More information about this security update

ImportantThis section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
322756How to back up and restore the registry in Windows
If an application no longer works after you install this security update, you can configure the registry to exempt the application from the update. To do this, use the following method:
  1. Click Start, click Run, type regedit in the Open box, and then click OK.
  2. Locate and then click the following subkey in the registry:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Application_name\
    Note In this step, Application_name is a placeholder for the name of the application that you want to exempt. You may have to create the Application_name subkey. To do this, follow these steps:
    1. On the Edit menu, point to New, and then click Key.
    2. Type a name for the Application subkey, and then press ENTER.

      Note The name for the Application subkey must match the name of the executable file for the application. The name must also include the three-letter extension of the executable file for the application. For example, Microsoft Office Excel uses the following excel.exe subkey:
      HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\excel.exe\
  3. On the Edit menu, point to New, and then click DWORD Value.
  4. Type AllowMessengerExecHandleFailure for the name of the DWORD, and then press ENTER.
  5. Right-click AllowMessengerExecHandleFailure, and then click Modify.
  6. In the Value data box, type 1, and then click OK.
  7. Exit Registry Editor.

File Information

The English (United States) version of this security update has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.

For all supported 32-bit editions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Msgsc.dll4.7.0.300294,72024-Jun-200815:45x86SP1 or SP2SP2GDR
Msgsc.dll4.7.0.300294,72024-Jun-200817:42x86SP1 or SP2SP2QFE

For all supported x64-based editions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Wmsgsc.dll4.7.0.300294,72025-Jun-200806:36x86SP1 or SP2SP2GDR\WOW
Wmsgsc.dll4.7.0.300294,72025-Jun-200806:27x86SP1 or SP2SP2QFE\WOW

For all supported Itanium-based editions of Windows Server 2003

File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Wmsgsc.dll4.7.0.300294,72025-Jun-200806:26x86SP1 or SP2SP2GDR\WOW
Wmsgsc.dll4.7.0.300294,72025-Jun-200806:20x86SP1 or SP2SP2QFE\WOW
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE WinNT Win2000
Properties

Article ID: 954723 - Last Review: 01/16/2015 02:34:21 - Revision: 3.0

  • Microsoft Windows Server 2003 Service Pack 1
  • Microsoft Windows Server 2003, Datacenter x64 Edition
  • Microsoft Windows Server 2003, Enterprise x64 Edition
  • Microsoft Windows Server 2003, Standard x64 Edition
  • Microsoft Windows XP Professional x64 Edition
  • Microsoft Windows Server 2003 Service Pack 2
  • kbnosurvey kbarchive atdownload kbbug kbexpertiseinter kbfix kbPubTypeKC kbsecbulletin kbsecurity kbsecvulnerability KB954723
Feedback