Microsoft KB Archive/271652

From BetaArchive Wiki

Article ID: 271652

Article Last Modified on 11/2/2006



APPLIES TO

  • Microsoft Windows NT Server 4.0, Terminal Server Edition
  • Microsoft Windows NT Server 4.0 Standard Edition
  • Microsoft Windows NT Server 4.0 Enterprise Edition
  • Microsoft Windows NT Workstation 4.0 Developer Edition
  • Microsoft Internet Information Server 4.0



This article was previously published under Q271652

We strongly recommend that all users upgrade to Microsoft Internet Information Services (IIS) version 6.0 running on Microsoft Windows Server 2003. IIS 6.0 significantly increases Web infrastructure security. For more information about IIS security-related topics, visit the following Microsoft Web site:

SYMPTOMS

Microsoft has released a patch that eliminates a security vulnerability in Internet Information Server (IIS). This vulnerability could enable a malicious user to send malformed URLs that prevent a Web server from being able to respond to requests for Web pages, FTP services, or any other services that are provided by IIS.

NOTE: This vulnerability does not provide the opportunity to compromise any data on the server or compromise any administrative privileges on the server. You can place the server back in service by restarting the IIS service.

You can find additional information about this vulnerability and the patch at the following Microsoft Web site:

Frequently asked questions about this vulnerability and the patch are available at the following Microsoft Web site:

CAUSE

The vulnerability is caused by a problem in Windows NT 4.0 that causes IIS to mishandle a particular type of invalid URL under certain conditions.

RESOLUTION

Windows NT 4.0

To resolve this problem, obtain the individual package referenced below or obtain the Windows NT 4.0 Security Rollup Package. For more information on the SRP, click the following article number to view the article in the Microsoft Knowledge Base:

299444 Post-Windows NT 4.0 Service Pack 6a Security Rollup Package (SRP)


The following file is available for download from the Microsoft Download Center:

For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:

119591 How to obtain Microsoft support files from online services


Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file. The English version of this fix has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.

   Date        Time    Size     File name     Platform
   ---------------------------------------------------------------
   08/17/2000  07:43p  375,056  Kernel32.dll  x86
   08/30/2000  07:07p  375,056  Kernel32.dll  x86 (Uniprocessor)

   08/17/2000  08:42p  590,096  Kernel32.dll  Alpha
   08/17/2000  08:42p  590,096  Kernel32.dll  Alpha (Uniprocessor)
                

Microsoft Windows NT Server version 4.0, Terminal Server Edition

To resolve this problem, obtain the Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package (SRP). For more information about the SRP, click the following article number to view the article in the Microsoft Knowledge Base:

317636 Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package


STATUS

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows NT 4.0.


Additional query words: security_patch

Keywords: kbhotfixserver kbqfe kbbug kbfix kbgraphxlinkcritical kbsecbulletin kbsecurity kbsecvulnerability KB271652