Applies ToWindows Embedded Standard 2009 Windows Embedded POSReady 2009

Summary

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploits the vulnerability could run malicious code remotely to take control of the user’s system. To learn more about the vulnerability, go to CVE-2018-8420.

More Information

File information The English (United States) version of this software update installs files that have the attributes that are listed in the following tables. The dates and the times for these files are listed in Coordinated Universal Time (UTC). The dates and the times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and the times may change when you perform certain operations on the files.

 

How to obtain help and support for this security update

Help for installing updates: Windows Update: FAQ Help for protecting your Windows-based computer from viruses and malware: Microsoft Secure Local support according to your country: International Support

File Information

File hash information

File name

SHA1 hash

SHA256 hash

WindowsXP-KB4458003-x86-Embedded-ENU.exe

A17D87D408201C9D690D726DA04D09F717BC661E

3FD6BBEC234324D1C552356CD0FB3E6F62CC738F407B5C2A7454F2FA10B3E6FC

For all supported x86-based versions

File name

File version

File size

Date

Time

Platform

SP requirement

Service branch

Msxml3.dll

8.100.1063.0

1,176,576

14-Aug-2018

14:32

x86

SP3

SP3QFE

Msxml6.dll

6.20.2506.0

1,447,936

14-Aug-2018

14:32

x86

SP3

SP3QFE

Updspapi.dll

6.3.13.0

382,840

31-Jan-2018

18:26

x86

None

Not applicable

Need more help?

Want more options?

Explore subscription benefits, browse training courses, learn how to secure your device, and more.

Communities help you ask and answer questions, give feedback, and hear from experts with rich knowledge.