MS06-034: Vulnerability in Internet Information Services that use Active Server Pages could allow remote code execution
This article has been archived. It is offered "as is" and will no longer be updated.
Microsoft has released security bulletin MS06-034. The security bulletin contains all the relevant information about the security update. This includes file manifest information and deployment options. To view the complete security bulletin, visit the following Microsoft Web site:
- Home users:
- IT professionals:
MS06-034 repeatedly reoffered by Auto Update or Windows Update
Users may experience an issue where the MS06-034 security update appears to install correctly, but is then reoffered by Auto Update or Windows Update. This occurs because of an issue with the way that Windows Update determines which computers should receive the update. Windows Update will mistakenly offer the update to computers that have the Internet Information Services (IIS) Common Files installed, but that do not have the Asp.dll binary to which the update applies.
This problem was corrected on July 17, 2006. Users who experience this problem can work around it by removing the IIS Common Files. To do this, follow these steps:
- Click Start, click Control Panel, and then double-click Add or Remove Programs.
- Click Add/Remove Windows Components, double-click Internet Information Services, click to clear the Common Files check box, click OK, click Next, and then click Finish.
MS06-034 installation fails on computers that have Windows Server 2003 SP1 installed
Users may experience an issue when they install the MS06-034 security update by using Windows Update or Auto Update. The update will appear to install correctly on computers that are running Windows Server 2003 SP1. However, if the update is installed when IIS is being used, the Asp.dll file is not updated. This problem occurs because IIS locks the Asp.dll file. This lock prevents the update from installing correctly.
This problem was corrected on July 17, 2006. Users who experience this problem can install the package again from Windows Update. Alternatively, users can manually download the update from the Microsoft Download Center.
Note The update package itself is unchanged from the version that was offered on July 12, 2006.
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE WinNT Win2000
Article ID: 917537 - Last Review: 12/09/2015 05:23:48 - Revision: 5.0
Microsoft Windows Server 2003 Service Pack 1, Microsoft Windows Server 2003, Datacenter Edition (32-bit x86), Microsoft Windows Server 2003, Enterprise Edition (32-bit x86), Microsoft Windows Server 2003, Standard Edition (32-bit x86), Microsoft Windows Server 2003, Web Edition, Microsoft Windows Server 2003, Datacenter x64 Edition, Microsoft Windows Server 2003, Enterprise x64 Edition, Microsoft Windows Server 2003, Standard x64 Edition, Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems, Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems, Microsoft Windows XP Professional x64 Edition, Microsoft Internet Information Services 6.0
- kbnosurvey kbarchive kbwinserv2003sp2fix kbqfe kbsecurity kbsecbulletin kbsecvulnerability kbbug kbfix kbwin2000presp5fix KB917537