Select the product you need help with
- Internet Explorer
- Windows Phone
- More products
MS00-063: Patch released for malformed URL vulnerability that disables Web server response
Article ID: 271652 - View products that this article applies to.
This article was previously published under Q271652
We strongly recommend that all users upgrade to Microsoft Internet Information Services (IIS) version 7.0 running on Microsoft Windows Server 2008. IIS 7.0 significantly increases Web infrastructure security. For more information about IIS security-related topics, visit the following Microsoft Web site:
http://www.microsoft.com/technet/security/prodtech/IIS.mspxFor more information about IIS 7.0, visit the following Microsoft Web site:
Microsoft has released a patch that eliminates a security vulnerability in Internet Information Server (IIS). This vulnerability could enable a malicious user to send malformed URLs that prevent a Web server from being able to respond to requests for Web pages, FTP services, or any other services that are provided by IIS.
NOTE: This vulnerability does not provide the opportunity to compromise any data on the server or compromise any administrative privileges on the server. You can place the server back in service by restarting the IIS service.
You can find additional information about this vulnerability and the patch at the following Microsoft Web site:
http://www.microsoft.com/technet/security/bulletin/ms00-063.mspxFrequently asked questions about this vulnerability and the patch are available at the following Microsoft Web site:
The vulnerability is caused by a problem in Windows NT 4.0 that causes IIS to mishandle a particular type of invalid URL under certain conditions.
Windows NT 4.0To resolve this problem, obtain the individual package referenced below or obtain the Windows NT 4.0 Security Rollup Package. For more information on the SRP, click the following article number to view the article in the Microsoft Knowledge Base:
299444The following file is available for download from the Microsoft Download Center:
(http://support.microsoft.com/kb/299444/ )Post-Windows NT 4.0 Service Pack 6a Security Rollup Package (SRP)
For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:
Download Q271652i.exe now
Collapse this imageExpand this image
119591Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file. The English version of this fix has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.
(http://support.microsoft.com/kb/119591/ )How to obtain Microsoft support files from online services
Date Time Size File name Platform --------------------------------------------------------------- 08/17/2000 07:43p 375,056 Kernel32.dll x86 08/30/2000 07:07p 375,056 Kernel32.dll x86 (Uniprocessor) 08/17/2000 08:42p 590,096 Kernel32.dll Alpha 08/17/2000 08:42p 590,096 Kernel32.dll Alpha (Uniprocessor)
Microsoft Windows NT Server version 4.0, Terminal Server EditionTo resolve this problem, obtain the Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package (SRP). For more information about the SRP, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/317636/ )Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package
Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows NT 4.0.
Article ID: 271652 - Last Review: July 3, 2008 - Revision: 6.1