Summary

A remote code execution vulnerability exists when Internet Explorer incorrectly accesses objects in memory.

To learn more about the vulnerability, go to CVE-2019-0765.

How to obtain and install the update

Method 1: Windows Update

This update is available through Windows Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to turn on automatic updating, see Windows Update: FAQ.

Method 2: Microsoft Update Catalog

To get the standalone package for this update, go to the Microsoft Update Catalog website.
 

Important

  • If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.

Information about protection and security

 

File Information

File hash information

File name

SHA1 hash

SHA256 hash

WindowsXP-KB4490228-x86-Embedded-ENU.exe

A81C03F3F775390169D890D6F99CD9D3E58CC62E

C02251DC52A8164F8DC2EF7481F1817C3BE2DB3C1CC46CA228578FA2B44DDFA6

Windows XP file information

For all supported x86-based versions

File name

File version

File size

Date

Time

Platform

SP requirement

Service branch

Comctl32.dll

6.0.2900.7660

1,054,208

09-Feb-2019

00:26

x86

None

Not applicable

Controls.man

Not applicable

1,862

09-Feb-2019

00:31

Not applicable

None

Not applicable

Comctl.man

Not applicable

621

09-Feb-2019

00:31

Not applicable

None

Not applicable

Comctl32.dll

6.0.2900.7660

1,054,208

09-Feb-2019

00:26

x86

SP3

SP3QFE

Controls.man

Not applicable

1,862

09-Feb-2019

00:31

Not applicable

SP3

SP3QFE

Comctl.man

Not applicable

621

09-Feb-2019

00:31

Not applicable

SP3

SP3QFE

Need more help?

Expand your skills
Explore Training
Get new features first
Join Microsoft Insiders

Was this information helpful?

What affected your experience?

Thank you for your feedback!

×