You are currently offline, waiting for your internet to reconnect

MS09-023: Vulnerability in Windows Search could allow information disclosure

Support for Windows XP has ended

Microsoft ended support for Windows XP on April 8, 2014. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

INTRODUCTION
Microsoft has released security bulletin MS09-023. To view the complete security bulletin, visit one of the following Microsoft Web sites:

How to obtain help and support for this security update

Help installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help protect your computer that is running Windows from viruses and malware:Virus Solution and Security Center

Local support according to your country: International Support

Known issues with this security update

The Windows Search update package is produced in English only. Although the update installs on other languages, there may be instances where the installer package shows both English and the language that is used by the localized operating system. This is expected behavior and occurs is because the installer package resources are taken both from the localized operating system and from the English update package. The package does address the security that is issue described in MS09-023, regardless of the language of the operating system.
FILE INFORMATION
The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time and with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.

Windows XP and Windows Server 2003 file information

  • The files that apply to a specific milestone (RTM, SPn) and service branch (QFE, GDR) are noted in the "SP requirement" and "Service branch" columns.
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.
  • In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KBnumber.cat) that is signed with a Microsoft digital signature.

For all supported x86-based versions of Windows Server 2003 and of Windows XP

File nameFile versionFile sizeDateTimePlatform
Mapine.dll7.0.6001.18260274,43225-May-200905:41x86
Msnlext.dll7.0.6001.18260596,99225-May-200905:45x86
Msnlnamespacemgr.dll7.0.6001.18260304,12825-May-200905:41x86
Mssph.dll7.0.6001.18260350,20825-May-200907:24x86
Spupdsvc.exe6.3.15.026,14412-May-200922:12x86

For all supported x64-based versions of Windows Server 2003 and of Windows XP Professional x64 edition

File nameFile versionFile sizeDateTimePlatform
Mapine.dll7.0.6001.18260364,03225-May-200909:13x64
Msnlext.dll7.0.6001.18260761,85625-May-200909:21x64
Msnlnamespacemgr.dll7.0.6001.18260388,60825-May-200909:13x64
Mssph.dll7.0.6001.18260498,17625-May-200912:19x64
Spupdsvc.exe6.3.15.028,70412-May-200922:12x64
Wmssph.dll7.0.6001.18260350,20825-May-200907:24x86
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE WinNT Win2000
Properties

Article ID: 963093 - Last Review: 05/09/2012 17:04:00 - Revision: 5.0

Microsoft Windows Server 2003 Service Pack 2, Microsoft Windows XP Service Pack 2, Microsoft Windows XP Service Pack 3

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability kbsurveynew KB963093
Feedback