Embedded Distributors and OEMs Who Purchase Through Distribution
The October 2012 Security Update is now available on the ECE for Microsoft® Windows® XP Embedded with Service Pack 3 and/or Windows® Embedded Standard 2009. This Update includes KB 2731847, KB 2705219, KB 2723135, KB 2749655, KB 2744842, KB 2724197 and KB 2756822.
This download includes cumulative database updates for the Windows® XP Embedded and Windows® Embedded Standard 2009 product development databases. The database updates incorporate all security updates from prior months; therefore you do not need to install previous security database updates.
The Updates in this rollup package are arranged in the following way:
The files in WindowsEmbeddedStandard folder are applicable to Windows Embedded Standard 2009 toolkit and images.
The executables in the WindowsEmbeddedStandard\Windows folder are only to be used with the Component Database within the Target Designer toolkit in the Windows Embedded Standard release.
The executables in the WindowsEmbeddedStandard\DQI folder contains individual updates to individually update the Windows Embedded Standard image.
The files in WindowsXPEmbedded folder are applicable to Windows XP Embedded toolkit and images.
The executables in the WindowsXPEmbedded\Windows folder are only to be used with the Component Database within the Target Designer toolkit in the Windows XP Embedded release.
The executables in the WindowsXPEmbedded\DQI folder contains individual updates to individually update the Windows XP Embedded image.
These updates should not be used with any other operating system.
This Update is rated as Critical:
The severity rating system provides a single rating for each vulnerability. The definitions of the ratings are in the table below. For more information regarding the severity system, please visit the Microsoft Security Response Center (MSRC) website.
Critical A vulnerability whose exploitation could allow the propagation of an Internet worm without user action. Important A vulnerability whose exploitation could result in compromise of the confidentiality, integrity, or availability of users data, or of the integrity or availability of processing resources. Moderate Exploitability is mitigated to a significant degree by factors such as default configuration, auditing, or difficulty of exploitation. Low A vulnerability whose exploitation is extremely difficult, or whose impact is minimal.
An optional supplement consisting of Supplemental Code and any associated documentation (collectively, the "Supplement") to the Licensed Products identified below is being made available as part of the Licensed Product Deliverables under the License Agreement. You may use the Supplement only in connection with Products and Versions listed below for which you are currently licensed.
Product Names and Versions: