Microsoft KB Archive/926122

From BetaArchive Wiki
Knowledge Base


MS07-039: Vulnerability in Windows Active Directory could allow remote code execution

Article ID: 926122

Article Last Modified on 10/11/2007



APPLIES TO

  • Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)
  • Microsoft Windows Server 2003, Enterprise Edition
  • Microsoft Windows Server 2003, Standard Edition (32-bit x86)
  • Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems
  • Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems
  • Microsoft Windows 2000 Server
  • Microsoft Windows 2000 Advanced Server
  • Microsoft Windows 2000 Datacenter Server
  • Microsoft Windows Server 2003, Datacenter x64 Edition
  • Microsoft Windows Server 2003, Enterprise x64 Edition
  • Microsoft Windows Server 2003, Standard x64 Edition



Important This article contains information about how to modify the registry. Make sure that you back up the registry before you modify it. Make sure that you know how to restore the registry if a problem occurs. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base:

322756 How to back up and restore the registry in Windows XP and Windows Vista


INTRODUCTION

Microsoft has released security bulletin MS07-039. The security bulletin contains all the relevant information about the security update. This information includes file manifest information and deployment options. To view the complete security bulletin, visit one of the following Microsoft Web sites:


Known issues with this security update

Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall the operating system. Microsoft cannot guarantee that these problems can be solved. Modify the registry at your own risk.

  • You do not have to install this update on Microsoft Windows 2000 Professional-based computers. However, you should install this update on all the Windows servers that are listed in the "Applies to" section, whether the server is a domain controller or not. This action helps protect the network if you decide to turn a server into a domain controller.
  • This security update changes the behavior of an earlier released hotfix (906381). Because of the new behavior, only domain administrators and network administrators can renew certificates. Also, an administrator cannot delegate the right to renew certificates. The set of users who can take advantage of this hotfix has been restricted. Customers who want to revert to the old behavior of hotfix 906381 can do so by follow these steps:
    1. Click Start, click Run, type regedit, and then click OK.
    2. Locate and then click the following registry subkey:

      HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\NTDS\Parameters

    3. On the Edit menu, point to New, and then click DWORD Value.
    4. Type Enable Skip Server Certificate Renewal Authentication for the name of the DWORD, and then press ENTER.
    5. Right-click Enable Skip Server Certificate Renewal Authentication, and then click Modify.
    6. In the Value data box, type 1, and then click OK.
    7. Exit Registry Editor.



Additional query words: update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE WinNT Win2000

Keywords: kbbug kbfix kbregistry kbsecvulnerability kbqfe kbsecurity kbsecbulletin kbpubtypekc kbwin2000sp5fix kbexpertiseinter kbwinserv2003postsp2fix KB926122