Microsoft KB Archive/142047

= Bad Network Packet May Cause Access Violation (AV) on DNS Server =

Article ID: 142047

Article Last Modified on 10/31/2006

-

APPLIES TO


 * Microsoft Windows NT Server 4.0, Terminal Server Edition
 * Microsoft Windows NT Server 4.0 Standard Edition

-



This article was previously published under Q142047





SYMPTOMS
The Domain Name System (DNS) fails with an access violation and ceases to resolve names.



CAUSE
If a DNS query is modified so that the original query's AnswerCount field is greater than 0, the DNS server may cause an access violation (AV).

If the AnswerCount is greater than 0, we expect to already have data from the original query, but in this case, the data is not present.



RESOLUTION
To resolve this problem, obtain the latest service pack for Windows NT To resolve this problem, obtain the latest service pack for Windows NT 4.0 or Windows NT Server 4.0, Terminal Server Edition. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

152734 How to Obtain the Latest Windows NT 4.0 Service Pack

For your convenience, the English version of this post-SP3 hotfix has been posted to the following Internet location. However, Microsoft recommends that you install Windows NT 4.0 Service Pack 4 to correct this problem.

ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/NT40/

hotfixes-postSP3/dns-fix



STATUS
Microsoft has confirmed that this is a problem in Windows NT 4.0 and Windows NT Server 4.0, Terminal Server Edition. This problem was first corrected in Windows NT 4.0 Service Pack 4.0 and Windows NT Server 4.0, Terminal Server Edition Service Pack 4.

Additional query words: 4.00 prodnt

Keywords: kbbug kbfix kbnetwork KB142047

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.