post-Windows NT 4.0 Service Pack ᾤࡨ Rollup ѡҤʹ¢ͧ 6a (SRP)

ź ź
Ţ (Article ID): 299444
Ңйҧ Ѻ Microsoft źԡ÷ҧԹ (IIS) 6.0 Microsoft Windows Server 2003 iis 6.0 ʹ¢ͧçҧ鹰ҹҡ ѺǡѺǢͷǢͧѺѡҤʹ IIS 价䫵仹ͧ Microsoft:
http://www.microsoft.com/technet/security/prodtech/IIS.mspx
· | غ

Һ˹ҹ

ػ

Microsoft ͡ѡҤʹ Rollup ᾤࡨ (SRP) Ѻ Windows NT 4.0 տѧѹ÷ӧҹҡͿѡҤʹ·͡Ѻ Windows NT 4.0 ҧ˹¢ͧ Windows NT 4.0 Service Pack 6a (SP6a) ¡ԡ äͺͧ䢡ŧ¡úѭ-SP6a ʴ䡡ç¢ѺèѴ rollout ͧ䢡ѡҤʹ ûء SRP ¹ŧдѺѺͧͧس

ǤǺͧӴѺ Compaq

ҤسԴǺǤǺͧӴѺ Compaq (Cpqarray.sys) ҡ 䫵ͧ Compaq, Compaq FTP 䫵 Compaq SmartStart ôٺ Microsoft Knowledge Base ǡѺǤǺͧӴѺ Compaq SRP 4.0 ͧ Windows NT 仹:
305228"stop 0xA" Դѧҡ Windows NT 4.0 Security Rollup ش

͡繴ԨԷ

Ҥسѧ¡ Internet Explorer 5.5 Service Pack 2 (SP2) Internet Explorer 5.01 Service Pack 2 (SP2) ФسҶ֧䫵աѡҤʹ (https://) ʹ Sockets Layer (SSL) ٺ㹰ҹͧ Microsoft 仹:
305929ͤʴͼԴҴ "Ѻͧ繴ԨԷ١ͧ" ͤسԴ駪ش Windows NT 4.0 Security Rollup

ͧ Microsoft IntelliPoint

Ҥس Microsoft IntelliPoint ǡ 2.2 ٺ㹰ҹͧ Microsoft 仹͹سԴ SRP:
305462鹾ش÷ӧҹѧҡسԴ駪ش Windows NT 4.0 Security Rollup

ͧ hp NTLock

Ҥس NTLock HP ٺ㹰ҹͧ Microsoft 仹:
311860ԡ NTLock Hewlett-Packard ÷ӧҹѧҡسԴ駪ش Windows NT 4.0 Security Rollup
Ҥسúԡ÷ سͧ Windows NT 4.0 service pack SRP Ѻ ԡŢ仹 ʹٺ㹰ҹͧ Microsoft::
196269͵Դ
Ҥسͧúԡ÷ ӵ鹵͹ҹ:
  1. Դ駡úԡ÷ companion ԡ÷ سѺþѺ˹ҵҧ NT 4.0
  2. ѧ ҡաõԴҡ͵鹩Ѻ ͹سʵͧ Դ Windows NT 4.0 SP6a سͧԴ SP6a ͹سԴ SRP ͧҡ SRP ͧ SP6a
  3. ʵͧ
  4. ԴẺ SRP
  5. ʵͧ
  6. Դ䢴ǹ SP6a ɳ ѺǡѺ SRP 价䫵仹ͧ Microsoft:
    http://technet.microsoft.com/en-us/library/cc767870.aspx
  7. ʵͧ
ѺǡѺõԴ hotfix µºٵ ԡŢ仹 ʹٺ Microsoft Knowledge Base::
296861ԸաõԴѺاͧ Windows 䢴ǹӹǹҡкͧ

Ϳҹҡ䫵仹ͧ Microsoft (Ңͧس سҵǨͺѺ):

غٻҾٻҾ
ǹŴ
ѹѧ

غٻҾٻҾ
ǹŴ
ѹѺ

غٻҾٻҾ
ǹŴ
ѹ (ͧ) չ

غٻҾٻҾ
ǹŴ
չ (ء) ѹ

غٻҾٻҾ
ǹŴ
չ () ѹ

غٻҾٻҾ
ǹŴ
ѹ

غٻҾٻҾ
ǹŴ


غٻҾٻҾ
ǹŴ
ѹҴѵ

غٻҾٻҾ
ǹŴ
ѹҿԹŹ

غٻҾٻҾ
ǹŴ
ѹҽ

غٻҾٻҾ
ǹŴ
(᤹Ҵ) 蹢ͧ

غٻҾٻҾ
ǹŴ
ѹ

غٻҾٻҾ
ǹŴ
ѹԺ

غٻҾٻҾ
ǹŴ
ѹѧ

غٻҾٻҾ
ǹŴ
ѹԵ

غٻҾٻҾ
ǹŴ
ҭ

غٻҾٻҾ
ǹŴ
ѹ NEC ҭ

غٻҾٻҾ
ǹŴ


غٻҾٻҾ
ǹŴ
ҹ

غٻҾٻҾ
ǹŴ
ѹŹ

غٻҾٻҾ
ǹŴ
õ (ҫ)

غٻҾٻҾ
ǹŴ
ѹ

غٻҾٻҾ
ǹŴ


غٻҾٻҾ
ǹŴ
ѹഹ

غٻҾٻҾ
ǹŴ
ѹ
˵:Ѻا繵ͧ Windows NT 4.0 SP6aѹҧ˹: 26 áҤ 2001

ѺǡѺԸաôǹŴʹѺʹعͧ Microsoft ôԡŢ仹ʹٺ Microsoft Knowledge Base::
119591ԸѺʹѺʹعͧëͿҡԡ͹Ź
Microsoft ᡹ Microsoft ͿǨͺش ѹաûС ѧǨж١ѡҤʹ 觪»ͧѹ¹ŧѺ͹حҵ˵:ͤسء Post-Windows NT 4.0 SP6a SRP (֧Ѻاʹ·㹺ŷչ MS01 026), ѧ SRP SP6a ͧ 4.0 NT Post-Windows Ҩҡѭ ͵ͧ䢻ѭҹ Դ駫Ϳ͸Ժ㹺㹰ҹͧ Microsoft 仹:
299273͡к UPN ӧҹѧҡس䢨ҡŷչѡҤʹ MS01 026
269430ͤʴͼԴҴ١ͧԡͧ駷ͤ͹'͡'㹡ͷʹ SSL

䢷 SRP

SRP ա SP6a ŧ¡úѭշ١觼ҹдҹǤʹ¢ͧ Microsoft. ͡ҡ ѧѧ֧ѭ١͹˹ʹҨӹǹҴ Because security bulletins are disruptive to customers' normal maintenance procedures, Microsoft typically issues them only when a security issue poses an immediate danger to your systems. Issues that do not meet this standard are typically addressed through other delivery vehicles such as service packs or, in this case, the SRP.
241041Enabling NetBT to open IP ports exclusively
243649MS99-047: Unchecked print spooler buffer may expose system vulnerability
243835MS99-046: How to prevent predictable TCP/IP initial sequence numbers
244599Fixes required in TCSEC C2 security evaluation configuration for Windows NT 4.0 Service Pack 6a
246045MS99-055: Malformed resource enumeration arguments may cause named pipes and other system services to fail
247869MS00-003: Local procedure call may permit unauthorized account usage
248183Syskey tool reuses keystream
248185Security Identifier enumeration function in LSA may not handle argument properly
248399MS00-007: Shared workstation setup may permit access to Recycle Bin files
249108Registry data is viewable by all users during Rdisk repair update
249197Internet Explorer does not allow use of single SGC certificate with 128-Bit encryption for virtual sites
249863SGC connections may fail from domestic clients
249973MS00-005: Default RTF file viewer interrupts normal program processing
250625MS00-024: Default registry key permissions may allow privilege elevation
252463MS00-006: Index server error message reveals physical location of Web folders
257870Malformed print request may stop Windows 2000 TCP/IP Printing service
259042Handle Leak in WinLogon after applying Windows NT 4.0 Service Pack 6
259496MS00-008: Incorrect registry setting may allow cryptography key compromise
259622MS00-027: Command processor may not parse excessive arguments properly
259728MS00-029: Windows hangs with fragmented IP datagrams
259773MS00-003: Incorrect response to local procedure call causes "Stop" error message
262388Denial-of-service attack possible from Linux RPC client
262694MS00-036: Malicious user can shut down computer browser service
264684MS00-040: Patch for "Remote Registry Access Authentication" vulnerability
265714MS00-095: Windows NT 4.0 SNMP registry entries are readable
266433MS00-070: Patch for numerous vulnerabilities in the LPC port system calls
267858"Memory could not be read" error message while doing file operation
267861MS00-095: RAS registry modification allowed without administrative rights
267864MS00-095: MTS Package Administration Key includes information about users
268082DNS SOA record may reveal Administrator account name
269049MS00-052: Registry-invoked programs use standard search path
269239MS00-047: NetBIOS vulnerability may cause duplicate name on the network conflicts
271216Fix for e-mail issues between 128-bit and 56-bit encryption using French regional settings
274835MS00-083: Buffer overflow in Network Monitor may cause vulnerability
275567MS00-091: Multiple NetBT sessions may hang local host
276575MS00-094: Patch available for "Phone Book service buffer overflow" vulnerability
279336MS01-003: Patch available for Winsock mutex vulnerability
279843Some system named pipes are not created with appropriate permissions
280119MS01-008: A patch is available for the NTLMSSP privilege elevation vulnerability
283001MS01-009: Patch available for malformed PPTP packet stream vulnerability
293818MS01-017: Erroneous VeriSign-issued digital certificates pose spoofing hazard
294472MS99-057: Index Server search function contains unchecked buffer
296185MS01-025: Patch available for new variant of the "Malformed Hit-Highlighting" vulnerability
298012MS01-041: Malformed RPC request can cause service problems
300972MS01-033: Unchecked buffer in Index Server ISAPI extension can enable Web server compromise
303628Relative path issue can allow program to be run under the System context

IIS fixes that are included in the SRP

252693Chunked encoding request with no data causes IIS memory leak
254142MS00-023: 100% CPU usage occurs when you send a large escape sequence
260205MS00-030: ͧ HTTP ¨ӹǹͧش˵ slashes ش٧ҹ CPU ҡ
260838MS00-031: IIS شԡ÷ͧ HTR
267559MS00-044: GET cancCause HTR "ʸԡ" Դҹ¡á
269862MS00-057: ͡ѺѭҢͼԴҴ canonicalization
271652MS00-063: 䢷͡Ѻͧ URL ٻẺԴҹõͺʹͧҡ
274149ءͧ SSL ʹ IIS
277873MS00-086: ҹͧѺͧ "ͧ¡"
285985MS01-004: 䢾ҹѺͧҹǹҹͧ.HTR
295534Թöʹ superfluous öԴ¡ôԹä觼ҹ IIS
䢷ǹ 14 Ҥ 2001 ͧ㹰ҹͧ Microsoft 仹 SRP SP6a ͧ 4.0 NT Post-Windows:
297860MS01-044: IIS 5.0 Security post-Windows NT 4.0 SP5 IIS 4.0 ¡ԡ

سѵ

Ţ (Article ID): 299444 - Ǥش: 8 Ҥ 2554 - Revision: 2.0
Keywords:
kbfix kbinfo kbqfe kbmt KB299444 KbMtth
¤
Ӥѭ: «ͿŴ¤ͧ Microsoft ᷹繹ѡŷ繺ؤ Microsoft պ¹ѡкŴ¤ سöҶ֧㹰ҹͧ Ңͧسͧ ҧá Ŵ¤Ҩբͺͧ ҨբͼԴҴ㹤Ѿ ٻẺҡó ǡѺóշǵҧҵԾٴԴ;ٴҢͧس Microsoft ǹѺԴͺͤҴ͹ ԴҴͤ·ԴҡҼԴҴ ͡麷Ţͧ١ Microsoft աûѺاͿŴ¤繻Ш
仹繩Ѻѧɢͧ:299444

ʹ

 

Contact us for more help

Contact us for more help
Connect with Answer Desk for expert help.
Get more support from smallbusiness.support.microsoft.com