Microsoft KB Archive/316112

= PRB: Session Variables Do Not Persist Between Requests After You Install Internet Explorer Security Patch MS01-055 =

PSS ID Number: 316112

Article Last Modified on 7/8/2005

-

The information in this article applies to:


 * Microsoft Active Server Pages
 * Microsoft Internet Explorer 6.0
 * Microsoft Internet Explorer 5.5
 * Microsoft Internet Information Services version 6.0
 * Microsoft Internet Information Services version 5.1
 * Microsoft Internet Information Services 5.0

-



This article was previously published under Q316112



SYMPTOMS
After you install security patch MS01-055 for Microsoft Internet Explorer 5.5 or 6.0, you may encounter the following problems:
 * Session variables are lost.
 * Session state is not maintained between requests.
 * Cookies are not set on the client system.

Note These problems can also occur after you install a more recent patch that includes the fix that is provided in security patch MS01-055.



CAUSE
Security patch MS01-055 prevents servers with improper name syntax from setting cookies names. Domains that use cookies must use only alphanumeric characters (&quot;-&quot; or &quot;.&quot;) in the domain name and the server name. Internet Explorer blocks cookies from a server if the server name contains other characters, such as an underscore character (&quot;_&quot;).

Because ASP session state and session variables rely on cookies to function, ASP cannot maintain session state between requests if cookies cannot be set on the client.

This issue can also be caused by an incorrect name syntax in a host header.



RESOLUTION
To work around this problem, use one of the following methods:
 * Rename the domain name and the server name, and use only alphanumeric characters.
 * Browse to the server by using the Internet Protocol (IP) address rather than the domain/server name.

Note You may need to change the Microsoft Internet Information Server (IIS) configuration after you rename a server. For more information, refer to the &quot;References&quot; section.



STATUS
This behavior is by design.



MORE INFORMATION
A potential security vulnerability exists in Internet Explorer versions 5.5 and 6.0 in which a malicious user could create a URL that allows a Web site to gain unauthorized access to cookies that are stored on a client computer and then (potentially) modify the values that are contained in these cookies. Because some Web sites use cookies that are stored on client computers to store sensitive information, this security vulnerability could expose personal information.

Security patch MS01-055 corrects this security vulnerability by preventing servers with improper name syntax from setting cookies names. This patch requires that server names follow the naming conventions that are specified in Appendix 1 of Request for Comments (RFC) 833 &quot;DOMAIN NAMES - IMPLEMENTATION and SPECIFICATION.&quot; For more information, refer to the &quot;References&quot; section.

