You are currently offline, waiting for your internet to reconnect

Microsoft Security Advisory: Vulnerability in Internet Explorer could allow information disclosure

INTRODUCTION
Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site:

To have us fix this problem for you, go to the "Fix it for me" section. If you would rather fix this problem yourself, see the workaround section in the security advisory.
Fix it for me
This fixit solution described in this section is not intended to be a replacement for any security update. We recommend that you always install the latest security updates. However, we offer this fixit solution as a workaround option for some scenarios.

For more information about this workaround, visit the following Microsoft Security Advisory Web page: The advisory provides more information about the issue, including the following:
  • The scenarios in which you might apply or disable the workaround.
  • How to manually apply the workaround.
Specifically, to see this information, look for the General Information heading, then expand the Suggested actions section, and then expand the Workaround section.

To automatically apply this resolution, click the Fix this problem link under the "Enable Network Protocol Lockdown" heading. Then, click Run in the File Download dialog box and follow the steps in the wizard. This applies the "enable network protocol lockdown" workaround that is listed in CVE-2010-0255.

To automatically undo the fix and restore the original settings, click the Fix this problem link under the "Disable Network Protocol Lockdown" heading. Then, click Run in the File Download dialog box and follow the steps in the wizard. This removes the "enable network protocol lockdown" workaround that is listed in CVE-2010-0255.

Microsoft has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they help block known attack vectors. For more information about the workarounds, see the security advisory.
Enable Network Protocol LockdownDisable Network Protocol Lockdown

Notes
  • This Fix it can be used with supported versions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
  • This wizard may be in English only. However, the automatic fix also works for other language versions of Windows.
  • If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem.
For more information about the Internet Explorer Network Protocol Lockdown functionality, visit the following Microsoft Web page:
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE WinNT Win2000
Properties

Article ID: 980088 - Last Review: 07/02/2010 11:15:00 - Revision: 4.0

Windows Internet Explorer 8, Windows Internet Explorer 7, Microsoft Internet Explorer 6.0, Microsoft Internet Explorer 5.01 Service Pack 4

  • kbexpertiseinter kbinfo kbsecadvisory kbsecurity kbsecvulnerability kbmsifixme kbfixme kbsurveynew KB980088
Feedback