Microsoft KB Archive/279843

From BetaArchive Wiki

Article ID: 279843

Article Last Modified on 3/1/2007



APPLIES TO

  • Microsoft Windows NT Server 4.0, Terminal Server Edition Service Pack 4
  • Microsoft Windows NT Server 4.0, Terminal Server Edition Service Pack 5
  • Microsoft Windows NT Server 4.0, Terminal Server Edition Service Pack 6
  • Microsoft Windows NT Server 4.0 Standard Edition
  • Microsoft Windows NT 4.0 Service Pack 1
  • Microsoft Windows NT 4.0 Service Pack 2
  • Microsoft Windows NT 4.0 Service Pack 3
  • Microsoft Windows NT 4.0 Service Pack 4
  • Microsoft Windows NT 4.0 Service Pack 5
  • Microsoft Windows NT 4.0 Service Pack 6a
  • Microsoft Windows NT Server 4.0 Enterprise Edition
  • Microsoft Windows NT 4.0 Service Pack 4
  • Microsoft Windows NT 4.0 Service Pack 5
  • Microsoft Windows NT 4.0 Service Pack 6a
  • Microsoft Windows NT Workstation 4.0 Developer Edition
  • Microsoft Windows NT Workstation 4.0 Developer Edition
  • Microsoft Windows NT Workstation 4.0 Developer Edition
  • Microsoft Windows NT Workstation 4.0 Developer Edition
  • Microsoft Windows NT Workstation 4.0 Developer Edition
  • Microsoft Windows NT Workstation 4.0
  • Microsoft Windows NT Workstation 4.0 Developer Edition



This article was previously published under Q279843

SYMPTOMS

Some system named pipes could behave in an unexpected manner and their functionality could be disrupted or broken. For example, errors could occur when you try to restart your computer or run net use commands. You may have to restart the computer (a "hard" boot, or hardware reset) to recover from such errors.

CAUSE

Some of the system named pipes are not created with proper protection. They are created with full permissions for everyone. This could allow a malicious user to open such a system named pipe and take control of it to cause undesirable behavior. For example, the malicious user could open such a named pipe with WRITE_DAC permissions and change the access control settings to deny everybody access to the named pipe. The malicious user could also inject bad data into the pipe or cause disruption of the service as mentioned in the "Symptoms" section of this article.

RESOLUTION

Windows NT 4.0

To resolve this problem, obtain the Windows NT 4.0 Security Rollup Package. For additional information, click the article number below to view the article in the Microsoft Knowledge Base:

299444 Post-Windows NT 4.0 Service Pack 6a Security Rollup Package (SRP)


This resolution ensures that such named pipes in the system are created with the correct permissions.

Microsoft Windows NT Server version 4.0, Terminal Server Edition

To resolve this problem, obtain the Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package (SRP). For additional information about the SRP, click the article number below to view the article in the Microsoft Knowledge Base:

317636 Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package


STATUS

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows NT 4.0.


Additional query words: security_patch

Keywords: kbbug kbfix kbsecurity KB279843