Microsoft KB Archive/271652

= MS00-063: Patch released for malformed URL vulnerability that disables Web server response =

Article ID: 271652

Article Last Modified on 11/2/2006

-

APPLIES TO


 * Microsoft Windows NT Server 4.0, Terminal Server Edition
 * Microsoft Windows NT Server 4.0 Standard Edition
 * Microsoft Windows NT Server 4.0 Enterprise Edition
 * Microsoft Windows NT Workstation 4.0 Developer Edition
 * Microsoft Internet Information Server 4.0

-



This article was previously published under Q271652



We strongly recommend that all users upgrade to Microsoft Internet Information Services (IIS) version 6.0 running on Microsoft Windows Server 2003. IIS 6.0 significantly increases Web infrastructure security. For more information about IIS security-related topics, visit the following Microsoft Web site:

http://www.microsoft.com/technet/security/prodtech/IIS.mspx



SYMPTOMS
Microsoft has released a patch that eliminates a security vulnerability in Internet Information Server (IIS). This vulnerability could enable a malicious user to send malformed URLs that prevent a Web server from being able to respond to requests for Web pages, FTP services, or any other services that are provided by IIS.

NOTE: This vulnerability does not provide the opportunity to compromise any data on the server or compromise any administrative privileges on the server. You can place the server back in service by restarting the IIS service.

You can find additional information about this vulnerability and the patch at the following Microsoft Web site:

http://www.microsoft.com/technet/security/bulletin/ms00-063.mspx

Frequently asked questions about this vulnerability and the patch are available at the following Microsoft Web site:

http://www.microsoft.com/technet/security/bulletin/fq00-063.mspx



CAUSE
The vulnerability is caused by a problem in Windows NT 4.0 that causes IIS to mishandle a particular type of invalid URL under certain conditions.



Windows NT 4.0
To resolve this problem, obtain the individual package referenced below or obtain the Windows NT 4.0 Security Rollup Package. For more information on the SRP, click the following article number to view the article in the Microsoft Knowledge Base:

299444 Post-Windows NT 4.0 Service Pack 6a Security Rollup Package (SRP)

The following file is available for download from the Microsoft Download Center:

Download Q271652i.exe now

For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:

119591 How to obtain Microsoft support files from online services

Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file. The English version of this fix has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.   Date        Time    Size     File name     Platform ---  08/17/2000  07:43p  375,056  Kernel32.dll  x86 08/30/2000 07:07p  375,056  Kernel32.dll  x86 (Uniprocessor)

08/17/2000 08:42p  590,096  Kernel32.dll  Alpha 08/17/2000 08:42p  590,096  Kernel32.dll  Alpha (Uniprocessor)

Microsoft Windows NT Server version 4.0, Terminal Server Edition
To resolve this problem, obtain the Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package (SRP). For more information about the SRP, click the following article number to view the article in the Microsoft Knowledge Base:

317636 Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package



STATUS
Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows NT 4.0.

Additional query words: security_patch

Keywords: kbhotfixserver kbqfe kbbug kbfix kbgraphxlinkcritical kbsecbulletin kbsecurity kbsecvulnerability KB271652

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.