Microsoft KB Archive/316112

From BetaArchive Wiki
Knowledge Base


PRB: Session Variables Do Not Persist Between Requests After You Install Internet Explorer Security Patch MS01-055

PSS ID Number: 316112

Article Last Modified on 7/8/2005



The information in this article applies to:

  • Microsoft Active Server Pages
  • Microsoft Internet Explorer 6.0
  • Microsoft Internet Explorer 5.5
  • Microsoft Internet Information Services version 6.0
  • Microsoft Internet Information Services version 5.1
  • Microsoft Internet Information Services 5.0



This article was previously published under Q316112

SYMPTOMS

After you install security patch MS01-055 for Microsoft Internet Explorer 5.5 or 6.0, you may encounter the following problems:

  • Session variables are lost.
  • Session state is not maintained between requests.
  • Cookies are not set on the client system.

Note These problems can also occur after you install a more recent patch that includes the fix that is provided in security patch MS01-055.

CAUSE

Security patch MS01-055 prevents servers with improper name syntax from setting cookies names. Domains that use cookies must use only alphanumeric characters ("-" or ".") in the domain name and the server name. Internet Explorer blocks cookies from a server if the server name contains other characters, such as an underscore character ("_").

Because ASP session state and session variables rely on cookies to function, ASP cannot maintain session state between requests if cookies cannot be set on the client.

This issue can also be caused by an incorrect name syntax in a host header.

RESOLUTION

To work around this problem, use one of the following methods:

  • Rename the domain name and the server name, and use only alphanumeric characters.
  • Browse to the server by using the Internet Protocol (IP) address rather than the domain/server name.

Note You may need to change the Microsoft Internet Information Server (IIS) configuration after you rename a server. For more information, refer to the "References" section.

STATUS

This behavior is by design.

MORE INFORMATION

A potential security vulnerability exists in Internet Explorer versions 5.5 and 6.0 in which a malicious user could create a URL that allows a Web site to gain unauthorized access to cookies that are stored on a client computer and then (potentially) modify the values that are contained in these cookies. Because some Web sites use cookies that are stored on client computers to store sensitive information, this security vulnerability could expose personal information.

Security patch MS01-055 corrects this security vulnerability by preventing servers with improper name syntax from setting cookies names. This patch requires that server names follow the naming conventions that are specified in Appendix 1 of Request for Comments (RFC) 833 "DOMAIN NAMES - IMPLEMENTATION and SPECIFICATION." For more information, refer to the "References" section.

REFERENCES

For additional information about security patch MS01-055, click the following article number to view the article in the Microsoft Knowledge Base:

312461 MS01-055: Internet Explorer cookie data can be exposed or altered through script injection


For additional information about IIS configuration changes that may be necessary after you rename the server, click the following article number to view the article in the Microsoft Knowledge Base:

234142 Updating IIS after you change the computer name


For more information about the RFC 883 specifications, refer to the following Internet Engineering Task Force Web site:


Additional query words: losing cookies missing variables 01-55

Keywords: kbCookie kbASPObj kbprb KbSECBulletin kbSecurity kbWebServer KB316112
Technology: kbASPsearch kbAudDeveloper kbIE550 kbIE550Search kbIE600 kbIE600Search kbIEsearch kbiis500 kbiis510 kbiis600 kbiisSearch