Microsoft KB Archive/191385

= Duplicate Rules Appear in Secure Channel Account Mappings Advanc =

Article ID: 191385

Article Last Modified on 9/22/2005

-

APPLIES TO


 * Microsoft Windows NT Server 4.0, Terminal Server Edition
 * Microsoft Internet Information Server 4.0

-



This article was previously published under Q191385



We strongly recommend that all users upgrade to Microsoft Internet Information Services (IIS) version 6.0 running on Microsoft Windows Server 2003. IIS 6.0 significantly increases Web infrastructure security. For more information about IIS security-related topics, visit the following Microsoft Web site:

http://www.microsoft.com/technet/security/prodtech/IIS.mspx



SYMPTOMS
When a wildcard mapping rule is created for certificates, and then deleted, it is only deleted from the UI list. Other wildcard mappings created after the deletion will appear twice in the list. This may also cause an access violation in Inetinfo.



CAUSE
The delete function only deletes the item from the display list. The function called when the Ok button is subsequently pressed resets the entire rule and then adds the items back. The problem is that only the first entry in the rule is deleted. The remaining items are added back to the list, creating duplicates.



RESOLUTION
To resolve this problem, obtain the latest service pack for Windows NT 4.0 or Windows NT Server 4.0, Terminal Server Edition. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

152734 How to Obtain the Latest Windows NT 4.0 Service Pack



STATUS
Microsoft has confirmed this to be a problem in Internet Information Server version 4.0. This problem was first corrected in Windows NT 4.0 Service Pack 4.0 and Windows NT Server 4.0, Terminal Server Edition Service Pack 4.

Additional query words: sp hot fix qfe inetinfo.exe

Keywords: kbbug kbfix kbqfe kbhotfixserver KB191385

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.