Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package (317636)



The information in this article applies to:

  • Microsoft Windows NT Server 4.0 Terminal Server Edition SP6

This article was previously published under Q317636

SUMMARY

Microsoft has released a Security Rollup Package (SRP) for Windows NT Server 4.0, Terminal Server Edition, that includes the functionality from the Post-Windows NT 4.0 SP6a Security Rollup Package and the security patches that are described in the "More Information" section in this article. This small, comprehensive, rollup of post-Service Pack 6 (SP6) fixes provides an easier mechanism for managing the rollout of security fixes.

The SRP includes only security updates for Windows NT 4.0. It does not include patches for any other products or operating systems. Microsoft Internet Information Server (IIS) is not intended for use on Windows NT Server 4.0, Terminal Server Edition, and is not supported. Microsoft recommends that customers who run IIS 4.0 on Windows NT Server 4.0, Terminal Server Edition, protect their systems by removing IIS 4.0.

MORE INFORMATION

For more information about the SRP, visit the following Microsoft Web site: For additional information about actions to take before you apply the SRP, click the article number below to view the article in the Microsoft Knowledge Base:

318587 Windows NT Server 4.0, Terminal Server Edition, Security Rollup Package Release Notes

Packages are available from the following Microsoft Web site (if your language is not listed, please check back):
DownloadEnglish Language Version

DownloadFrench Language Version

DownloadGerman Language Version

DownloadJapanese Language Version

DownloadSpanish Language Version

NOTE: This package requires Windows NT Server 4.0, Terminal Server Edition, SP6.

Release Date: April 24, 2002

For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:

119591 How to Obtain Microsoft Support Files from Online Services

Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file.

Fixes That Are Included in the SRP

The SRP includes the following post-SP6 fixes that have been delivered by Microsoft Security Bulletins. The SRP also includes some fixes that have not been previously described. Because security bulletins are disruptive to customer's maintenance procedures, Microsoft often issues them only when a security issue poses an immediate danger to customer's computers. Issues that do not meet this standard are typically addressed through other delivery vehicles such as service packs or, in this case, the SRP.

238349 Specially-Malformed Header in GET Request Creates Denial of Service

241041 Enabling NetBT to Open IP Ports Exclusively

242294 MS99-041: Security Descriptor Allows Privilege Elevation on Remote Computers

243835 MS99-046: How to Prevent Predictable TCP/IP Initial Sequence Numbers

246045 MS99-055: Malformed Resource Enumeration Arguments May Cause Named Pipes and Other System Services to Fail

247869 MS00-003: Local Procedure Call May Permit Unauthorized Account Usage

248183 Syskey Tool Reuses Keystream

248185 Security Identifier Enumeration Function in LSA May Not Handle Argument Properly

248399 MS00-007: Shared Workstation Setup May Permit Access to Recycle Bin Files

249108 Registry Data Is Viewable By All Users During Rdisk Repair Update

249197 Internet Explorer Does Not Allow Use of Single SGC Certificate with 128-Bit Encryption for Virtual Sites

249863 SGC Connections May Fail from Domestic Clients

249973 MS00-005: Default RTF File Viewer Interrupts Normal Program Processing

250625 MS00-024: Default Registry Key Permissions May Allow Privilege Elevation

257870 Malformed Print Request May Stop Windows 2000 TCP/IP Printing Service

259042 Handle Leak in WinLogon After Applying Windows NT 4.0 Service Pack 6

259496 MS00-008: Incorrect Registry Setting May Allow Cryptography Key Compromise

259622 MS00-027: Command Processor May Not Parse Excessive Arguments Properly

259728 MS00-029: Windows Hangs with Fragmented IP Datagrams

259773 MS00-003: Incorrect Response to Local Procedure Call Causes "Stop" Error Message

262388 Denial-of-Service Attack Possible from Linux RPC Client

262694 MS00-036: Malicious User Can Shut Down Computer Browser Service

263307 MS00-036: Excessive Browser Announcements May Force Computer Shutdown

264684 MS00-040: Patch for "Remote Registry Access Authentication" Vulnerability

266433 MS00-070: Patch for Numerous Vulnerabilities in the LPC Port System Calls

267858 "Memory Could Not Be Read" Error Message While Doing File Operation

268082 DNS SOA Record May Reveal Administrator Account Name

269049 MS00-052: Registry-Invoked Programs Use Standard Search Path

269239 MS00-047: NetBIOS Vulnerability May Cause Duplicate Name on the Network Conflicts

271216 Fix for E-mail Issues Between 128-Bit and 56-Bit Encryption Using French Regional Settings

274835 MS00-083: Buffer Overflow in Network Monitor May Cause Vulnerability

275567 MS00-091: Multiple NetBT Sessions May Hang Local Host

276575 MS00-094: Patch Available for "Phone Book Service Buffer Overflow" Vulnerability

277910 MS00-087: Patch Available for "Terminal Server Login Buffer Overflow" Vulnerability

279336 MS01-003: Patch Available for Winsock Mutex Vulnerability

279843 Some System Named Pipes Are Not Created with Appropriate Permissions

280119 MS01-008: A Patch Is Available for the NTLMSSP Privilege Elevation Vulnerability

283001 MS01-009: Patch Available for Malformed PPTP Packet Stream Vulnerability

292435 MS01-040: Invalid RDP Data Can Cause Memory Leak in Terminal Services

293818 MS01-017: Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard

298012 MS01-041: Malformed RPC Request Can Cause Service Problems

303628 Relative Path Issue Can Allow Program to Be Run Under the System Context

FrontPage Server Extensions

280322 FP2000: MS00-100: Patch for Malformed Web Form Submission Security Vulnerability

NOTE: FrontPage Server Extensions are included as part of the Windows NT 4.0 Option Pack, which is not supported on Windows NT Server 4.0, Terminal Server Edition. Patches for FrontPage Server Extensions have been provided as part of the SRP only for customers who have installed the Option Pack to protect their computers during the migration to a supported operating system.

Index Server 2.0

252463 MS00-006: Index Server Error Message Reveals Physical Location of Web Folders

294472 MS99-057: Index Server Search Function Contains Unchecked Buffer

296185 MS01-025: Patch Available for New Variant of the "Malformed Hit-Highlighting" Vulnerability

300972 MS01-033: Unchecked Buffer in Index Server ISAPI Extension Can Enable Web Server Compromise

NOTE: Index Server 2.0 is part of the Windows NT 4.0 Option Pack which is not supported on Windows NT Server 4.0, Terminal Server Edition. Patches for Index Server 2.0 have been provided as part of the SRP only for customers who have installed the Option Pack to protect their computers during the migration to a supported operating system.

Internet Information Server 4.0

241805 Combined FTP and Domain Restriction Security Patch for IIS 4.0

244613 IIS 4.0 SSL ISAPI Filter Can Leak Single Buffer of Plaintext

246401 MS99-061: IIS May Improperly Parse Specific Escape Characters

249599 Virtual Directory Mapped to UNC Returns Server-Side Script Code When URL Contains Additional Characters at the End of the Request

252693 Chunked Encoding Request with No Data Causes IIS Memory Leak

254142 MS00-023: 100% CPU Usage Occurs When You Send a Large Escape Sequence

260205 MS00-030: HTTP Request with a Large Number of Dots or Dot-Slashes Causes High CPU Utilization

260347 MS00-060: IIS 4: Fix for Cross-Site Scripting Issues

260838 MS00-031: IIS Stops Servicing HTR Requests

267559 MS00-044: GET on HTR File Can Cause a "Denial of Service" or Enable Directory Browsing

269862 MS00-057: Patch Released for Canonicalization Error Issue

271652 MS00-063: Patch Released for Malformed URL Vulnerability That Disables Web Server Response

274149 Cookies Are Not Marked as SSL-Secured in IIS

277873 MS00-086: Patch Available for "Web Server File Request Parsing" Vulnerability

285985 MS01-004: Patch Available for New Variant of File Fragment Reading via .HTR Vulnerability

295534 MS01-026: Superfluous Decoding Operation Can Allow Command Execution Through IIS

297860 MS01-044: IIS 5.0 Security and Post-Windows NT 4.0 SP5 IIS 4.0 Patch Rollup

319733 MS02-018: April 2002 Cumulative Patch for Internet Information Services

NOTE: Internet Information Server 4.0 is part of the Windows NT 4.0 Option Pack which is not supported on Windows NT Server 4.0, Terminal Server Edition. Patches for IIS 4.0 have been provided as part of the SRP only for customers who have installed the Option Pack to protect their computers during the migration to a supported operating system.

Fixes Not Included in Windows NT Server 4.0, Terminal Server Edition SRP

The Windows NT Server 4.0, Terminal Server Edition SRP does not supersede the patches that are included in the following post-SP6 security bulletins:

300845 MS02-013: Java Applet Can Redirect Browser Traffic

311967 MS02-017: Unchecked Buffer in the Multiple UNC Provider

313829 Unchecked Buffer in Windows Shell Could Lead to Code Running

314147 MS02-006: An Unchecked Buffer in the SNMP Service May Allow Code to Run

318202 MS02-008: XMLHTTP Control in MSXML 2.0 Can Allow Access to Local Files

The Windows NT Server 4.0, Terminal Server Edition SRP does not include the patch delivered in the following post-SP6 security bulletin, because it should only be applied if WebDAV has been installed on the server.

296441 MS01-022: WebDAV Service Provider Can Allow Scripts to Levy Requests as a User

The Windows NT Server 4.0, Terminal Server Edition SRP does not include the tools that are provided as part of the following bulletins. These tools should be downloaded and run separately.

265714 MS00-095: Windows NT 4.0 SNMP Registry Entries Are Readable

267861 MS00-095: RAS Registry Modification Allowed Without Administrative Rights

267864 MS00-095: MTS Package Administration Key Includes Information About Users

The Windows NT Server 4.0, Terminal Server Edition SRP does not supersede the following bulletin, because the fix in this case requires an administrative procedure rather than a software change.

241219 MS99-036: Unattended Installation File Is Not Deleted After Setup Finishes


Modification Type:MajorLast Reviewed:9/27/2006
Keywords:kbHotfixServer kbQFE kbfix kbinfo kbQFE kbSecurity KB317636