MS00-063: Patch released for malformed URL vulnerability that disables Web server response

Article translations Article translations
Article ID: 271652 - View products that this article applies to.
This article was previously published under Q271652
This article has been archived. It is offered "as is" and will no longer be updated.
We strongly recommend that all users upgrade to Microsoft Internet Information Services (IIS) version 7.0 running on Microsoft Windows Server 2008. IIS 7.0 significantly increases Web infrastructure security. For more information about IIS security-related topics, visit the following Microsoft Web site:
http://www.microsoft.com/technet/security/prodtech/IIS.mspx
For more information about IIS 7.0, visit the following Microsoft Web site:
http://www.iis.net/default.aspx?tabid=1
Expand all | Collapse all

On This Page

Symptoms

Microsoft has released a patch that eliminates a security vulnerability in Internet Information Server (IIS). This vulnerability could enable a malicious user to send malformed URLs that prevent a Web server from being able to respond to requests for Web pages, FTP services, or any other services that are provided by IIS.

NOTE: This vulnerability does not provide the opportunity to compromise any data on the server or compromise any administrative privileges on the server. You can place the server back in service by restarting the IIS service.

You can find additional information about this vulnerability and the patch at the following Microsoft Web site:
http://www.microsoft.com/technet/security/bulletin/ms00-063.mspx
Frequently asked questions about this vulnerability and the patch are available at the following Microsoft Web site:
http://www.microsoft.com/technet/security/bulletin/fq00-063.mspx

Cause

The vulnerability is caused by a problem in Windows NT 4.0 that causes IIS to mishandle a particular type of invalid URL under certain conditions.

Resolution

Windows NT 4.0

To resolve this problem, obtain the individual package referenced below or obtain the Windows NT 4.0 Security Rollup Package. For more information on the SRP, click the following article number to view the article in the Microsoft Knowledge Base:
299444 Post-Windows NT 4.0 Service Pack 6a Security Rollup Package (SRP)
The following file is available for download from the Microsoft Download Center:
Collapse this imageExpand this image
Download
Download Q271652i.exe now
For more information about how to download Microsoft support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to obtain Microsoft support files from online services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help prevent any unauthorized changes to the file. The English version of this fix has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.
   Date        Time    Size     File name     Platform
   ---------------------------------------------------------------
   08/17/2000  07:43p  375,056  Kernel32.dll  x86
   08/30/2000  07:07p  375,056  Kernel32.dll  x86 (Uniprocessor)

   08/17/2000  08:42p  590,096  Kernel32.dll  Alpha
   08/17/2000  08:42p  590,096  Kernel32.dll  Alpha (Uniprocessor)
				

Microsoft Windows NT Server version 4.0, Terminal Server Edition

To resolve this problem, obtain the Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package (SRP). For more information about the SRP, click the following article number to view the article in the Microsoft Knowledge Base:
317636 Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package

Status

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows NT 4.0.

Properties

Article ID: 271652 - Last Review: October 26, 2013 - Revision: 7.0
Applies to
  • Microsoft Windows NT Server 4.0 Standard Edition
  • Microsoft Windows NT Server 4.0 Enterprise Edition
  • Microsoft Windows NT Workstation 4.0 Developer Edition
Keywords: 
kbnosurvey kbarchive kbhotfixserver kbqfe kbbug kbfix kbgraphxlinkcritical kbsecbulletin kbsecurity kbsecvulnerability KB271652

Give Feedback

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com