Microsoft KB Archive/328970

= MS02-066: November, 2002, Cumulative Patch for Internet Explorer =

Article ID: 328970

Article Last Modified on 2/1/2007

-

APPLIES TO


 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 5.5 Service Pack 2
 * Microsoft Internet Explorer 5.5 Service Pack 2
 * Microsoft Internet Explorer 5.5 Service Pack 2
 * Microsoft Internet Explorer 5.5 Service Pack 2
 * Microsoft Internet Explorer 5.5 Service Pack 2
 * Microsoft Internet Explorer 5.5
 * Microsoft Internet Explorer 5.01

-



This article was previously published under Q328970



SUMMARY
Microsoft has released a cumulative patch for Internet Explorer. This patch includes updates for the issues that are described in the following Microsoft Knowledge Base articles:

323759 MS02-047: August 22, 2002, Cumulative Patch for Internet Explorer

321232 MS02-023: May 15, 2002, Cumulative Patch for Internet Explorer

316059 MS02-005: February 11, 2002, Cumulative Patch for Internet Explorer

319182 MS02-015: March 28, 2002, Cumulative Patch for Internet Explorer

This cumulative patch also prevents the following security vulnerabilities:
 * A buffer-overrun vulnerability that occurs because Internet Explorer does not correctly check the parameters of Portable Network Graphics (PNG) files when they are opened. To the best of Microsoft's knowledge, this vulnerability can be used only to cause Internet Explorer to stop working. The effect of exploiting this vulnerability against Internet Explorer is relatively minor. You have only to restart Internet Explorer to restore typical operation. However, a number of other Microsoft products (notably, most Microsoft Office products and Microsoft Index Server) rely on Internet Explorer to render PNG files. Exploiting this vulnerability against such a program causes them to stop working also. Because of this, Microsoft recommends that customers install this patch whether or not they are using Internet Explorer as the primary Web browser.
 * An information-disclosure vulnerability that is related to the way in which Internet Explorer handles encoded characters in a Web address (URL). This vulnerability might permit an attacker to craft a URL that contains some encoded characters. The encoded characters might redirect you to a second Web site. If you follow the URL, the attacker can gain the same access as you on the second Web site. This might permit the attacker to access any information that you share with the second Web site.
 * A vulnerability that occurs because Internet Explorer does not, under some conditions, correctly check the component that the OBJECT tag calls. This might permit an attacker to obtain the name of the Temporary Internet Files folder on your local computer. This vulnerability does not permit an attacker to read or modify any files on your local computer because the Temporary Internet Files folder is located in the Internet security zone. Knowing the name of the Temporary Internet Files folder might permit an attacker to identify the user name of the logged-on user, and to read other information in the Temporary Internet Files folder (such as cookies).
 * Three vulnerabilities that, although they have different root causes, have the same effects. All three vulnerabilities occur because incomplete security checks occur out when particular programming techniques are used in Web pages. These vulnerabilities might permit one Web site to access information from another domain, including your local computer. This might permit the Web site operator to read, but not to change, any file that can be viewed in a browser window on your local computer . These vulnerabilities might also permit an attacker to start a program file that is already present on your local computer.

This cumulative patch also sets the &quot;kill&quot; bit on the MSN Chat ActiveX control that is described in the following Microsoft Security Bulletin:

MS02-022: http://www.microsoft.com/technet/security/bulletin/MS02-022.mspx

For additional information, click the following article numbers to view the articles in the Microsoft Knowledge Base:

240797 How to Stop an ActiveX Control from Running in Internet Explorer

810202 Security Vulnerability in DirectX Files Viewer ActiveX Control

This process makes sure that a vulnerable control cannot be added to your computer. For additional information about known issues that can occur when you install this update, click the following article number to view the article in the Microsoft Knowledge Base:

325192 Issues After You Install Updates to Internet Explorer or Windows

To resolve this problem, obtain the latest service pack for Microsoft Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

260910 How to Obtain the Latest Windows 2000 Service Pack



MORE INFORMATION
For more information about this patch, visit the following Microsoft Web site:

http://www.microsoft.com/athome/security/update/bulletins/default.mspx

Download Information
The following file is available for download from the Microsoft Download Center:

Download the 328970 package now

Release Date: November 20, 2002

For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:

119591 How to Obtain Microsoft Support Files from Online Services

Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.

Installation Information
You can install the Internet Explorer 6 version of this update on Internet Explorer 6 or on Internet Explorer 6 Service Pack 1 (SP1). For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

328548 How to Obtain the Latest Service Pack for Internet Explorer 6

The Internet Explorer 5.5 version of this update requires Internet Explorer 5.5 Service Pack 2 (SP2). For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

276369 How to Obtain the Latest Service Pack for Internet Explorer 5.5

The Internet Explorer 5.01 for Windows 2000 version of this update requires Windows 2000 Service Pack 3 (SP3). For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

260910 How to Obtain the Latest Windows 2000 Service Pack

You must restart your computer after you apply this update.

This package supports the following switches:
 * /q Specifies Quiet mode, or suppresses prompts, when files are being extracted.
 * /q:u Specifies User-Quiet mode, which presents some dialog boxes to the user.
 * /q:a Specifies Administrator-Quiet mode, which does not present any dialog boxes to the user.
 * /t:  Specifies the target folder for extracting files.
 * /c Extracts the files without installing them.
 * /c:  Specifies the path and name of the Setup .inf or .exe file.
 * /r:n Never restarts the computer after installation.
 * /r:i Restart if a restart is required--automatically restarts the computer if the computer must be restarted to complete installation.
 * /r:a Always restarts the computer after installation.
 * /r:s Restarts the computer after installation without prompting the user.
 * /n:v No version checking--installs the program over any previous version.

For example, the  /q:a /r:n command installs the update without any user intervention, and does not force the computer to restart.

WARNING: Your computer is vulnerable until you restart it and log on as an administrator to complete the installation.

NOTE: You cannot successfully install this update on Microsoft Windows XP-based computers in non-interactive mode (for example, by using Windows Task Scheduler, Microsoft Systems Management Server, or the IBM Tivoli software). Microsoft is researching this problem and will post more information in this article when the information becomes available.

File Information
The English version of this fix has the file attributes (or later) that are listed in the following table. The dates and times for these files are listed in coordinated universal time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time tool in Control Panel.

The following files are installed in the %Windir%\System32 folder.

Internet Explorer 6 with SP1 (32-bit)
  Date         Time   Version        Size       File name -  29-Aug-2002  09:23  6.0.2800.1106     91,136  Advpack.dll 10-Oct-2002 22:17  6.0.2800.1126  2,787,840  Mshtml.dll 10-Oct-2002 22:18  6.0.2800.1126    483,328  Urlmon.dll

Internet Explorer 6 with SP1 (64-bit)
  Date         Time   Version        Size       File name 15-Oct-2002 17:21  6.0.2800.1126  9,064,448  Mshtml.dll 15-Oct-2002 17:26  6.0.2800.1126  1,410,560  Urlmon.dll

Internet Explorer 6
  Date         Time   Version       Size       File name 15-Oct-2002 18:37  6.0.2722.900  2,764,288  Mshtml.dll 16-Oct-2002 22:38  6.0.2722.900     34,304  Pngfilt.dll 05-Mar-2002 01:09  6.0.2715.400    548,864  Shdoclc.dll 11-Oct-2002 17:53  6.0.2722.900  1,336,832  Shdocvw.dll 16-Oct-2002 22:38  6.0.2715.400    109,568  Url.dll 11-Oct-2002 17:53  6.0.2722.900    481,280  Urlmon.dll 06-Jun-2002 18:38  6.0.2718.400    583,168  Wininet.dll

Internet Explorer 5.5 with SP2
  Date         Time   Version        Size       File name -  06-Jun-2000  21:43  5.50.4134.600     92,432  Advpack.dll 17-Oct-2002 00:36  5.50.4922.900  2,757,392  Mshtml.dll 17-Oct-2002 01:01  5.50.4922.900     48,912  Pngfilt.dll 15-Oct-2002 22:40  5.50.4922.900  1,149,200  Shdocvw.dll 05-Mar-2002 02:53  5.50.4915.500     84,240  Url.dll 15-Oct-2002 22:41  5.50.4922.900    451,344  Urlmon.dll 06-Jun-2002 22:27  5.50.4918.600    481,552  Wininet.dll

Internet Explorer 5.01 on Windows 2000 SP3
  Date         Time   Version        Size       File name -  15-Oct-2002  15:57  5.0.3510.1100  2,358,032  Mshtml.dll 14-Oct-2002 16:28  5.0.3510.1100     48,912  Pngfilt.dll 14-Oct-2002 17:02  5.0.3510.1100  1,106,704  Shdocvw.dll 05-Mar-2002 02:53  5.50.4915.500     84,240  Url.dll 14-Oct-2002 17:02  5.0.3510.1100    455,952  Urlmon.dll 08-Jun-2002 00:56  5.0.3506.1000    461,584  Wininet.dll NOTE: Because of file dependencies, these updates may also contain additional files.

Additional query words: security_patch patch30

Keywords: kbbug kbfix kbwin2000presp4fix kbsecvulnerability kbie600presp2fix kbsecurity kbie600sp2fix kbie550presp3fix kbsecbulletin kbwin2ksp4fix KB328970

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.