This article was previously published under Q278511
This article has been archived. It is offered "as is" and will no longer be updated.
Microsoft has released a patch that eliminates a security vulnerability in Microsoft Windows 2000. The vulnerability could allow enable a malicious user to potentially run code on another user's machine. For more information about this vulnerability and the patch, please view the following Microsoft Web site:
This problem can occur because there is an unchecked buffer in an ActiveX control that ships as part of Windows 2000. By providing carefully-crafted parameters when invoking the control, it would be possible to cause code of the caller's choice to run by using a buffer overrun.
To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
The following files are available for download from the MicrosoftDownload Center:
To download the the file name below, click the link, click Next, and then click Download Now.
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.
The English-language version of this fix should have the following file attributes or later: Date Time Size File name Platform ------------------------------------------------------------ 10/31/2000 2:42:10pm 3,584 Spmsg.dll i386 10/26/2000 3:22:04pm 172,304 Sysmon.ocx i386
Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows 2000 Service Pack 2.