MS09-057: Vulnerability in Indexing Service could allow remote code execution

Support for Windows XP has ended

Microsoft ended support for Windows XP on April 8, 2014. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

Support for Windows Server 2003 ended on July 14, 2015

Microsoft ended support for Windows Server 2003 on July 14, 2015. This change has affected your software updates and security options. Learn what this means for you and how to stay protected.

INTRODUCTION
Microsoft has released security bulletin MS09-057. To view the complete security bulletin, visit one of the following Microsoft Web sites:

How to obtain help and support for this security update

Help installing updates: Support for Microsoft Update

Security solutions for IT professionals: TechNet Security Troubleshooting and Support

Help protect your computer that is running Windows from viruses and malware:Virus Solution and Security Center

Local support according to your country: International Support

FILE INFORMATION
The English (United States) version of this security update has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.

Windows 2000 file information

For all supported editions of Microsoft Windows 2000 Service Pack 4

File NameVersionDateTimeSize
query.dll5.0.2195.732012-Aug-200904:321,428,240

Windows XP and Windows Server 2003 file information

  • The files that apply to a specific milestone (RTM, SPn) and service branch (QFE, GDR) are noted in the "Service branch" columns.
  • GDR service branches contain only those fixes that are widely released to address widespread, critical issues. QFE service branches contain hotfixes in addition to widely released fixes.
  • In addition to the files that are listed in these tables, this software update also installs an associated security catalog file (KBnumber.cat) that is signed with a Microsoft digital signature.

For all supported x86-based versions of Windows XP

File NameVersionDateTimeSizeService branch
query.dll5.1.2600.360217-Jul-200916:271,435,648SP2GDR
query.dll5.1.2600.360218-Jul-200904:401,435,648SP2QFE
query.dll5.1.2600.584717-Jul-200916:221,435,648SP3GDR
query.dll5.1.2600.584717-Jul-200916:011,435,648SP3QFE

For all supported x64-based versions of Windows Server 2003 and of Windows XP Professional x64 edition

File NameVersionDateTimeSizeCPUService branch
query.dll5.2.3790.455418-Jul-200905:532,684,416X64SP2GDR
wquery.dll5.2.3790.455418-Jul-200905:531,432,576X86SP2GDR\wow
query.dll5.2.3790.455418-Jul-200905:452,684,416X64SP2QFE
wquery.dll5.2.3790.455418-Jul-200905:451,432,576X86SP2QFE\wow

For all supported x86-based versions of Windows Server 2003

File NameVersionDateTimeSizeService branch
query.dll5.2.3790.455417-Jul-200916:501,432,576SP2GDR
query.dll5.2.3790.455417-Jul-200916:591,432,576SP2QFE

For all supported IA-64-based versions of Windows Server 2003

File NameVersionDateTimeSizeCPUService branch
query.dll5.2.3790.455418-Jul-200905:525,163,520IA-64SP2GDR
wquery.dll5.2.3790.455418-Jul-200905:521,432,576X86SP2GDR\wow
query.dll5.2.3790.455418-Jul-200905:445,163,520IA-64SP2QFE
wquery.dll5.2.3790.455418-Jul-200905:441,432,576X86SP2QFE\wow
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE
Properties

Article ID: 969059 - Last Review: 05/09/2012 17:02:00 - Revision: 3.0

Microsoft Windows Server 2003 Service Pack 2, Microsoft Windows XP Service Pack 2, Microsoft Windows XP Service Pack 3, Microsoft Windows 2000 Service Pack 4

  • atdownload kbbug kbexpertiseinter kbfix kbsecbulletin kbsecurity kbsecvulnerability kbsurveynew KB969059
Feedback