Microsoft Product Support Services   All Products  |   Support  |   Search  |   microsoft.com Home  
microsoft.com
  Support Home  |   Find a Solution  |   Request Support  |   Custom Support  |

Post-Windows NT 4.0 Service Pack 6a Security Rollup Package (SRP)


The information in this article applies to:
  • Microsoft Windows NT Server version 4.0 SP6a
  • Microsoft Windows NT Server, Enterprise Edition version 4.0 SP6a
  • Microsoft Windows NT Workstation version 4.0 SP6a


SUMMARY

Microsoft has released a Security Rollup Package (SRP) for Windows NT 4.0 that includes the functionality from all security patches released for Windows NT 4.0 since the release of Windows NT 4.0 Service Pack 6a (SP6a). This small, comprehensive rollup of post-SP6a fixes provides an easier mechanism for managing the rollout of security fixes. Applying the SRP does not change the encryption level of your computer.

If you add optional services, you must reapply the Windows NT 4.0 service pack and then the SRP. For additional information, click the article number below to view the article in the Microsoft Knowledge Base:

Q196269 When to Reinstall a Service Pack
If you need to add optional services, follow these steps:
  1. Install all optional services and companion services. You will be prompted for the original Window NT 4.0 media.

  2. After the files are installed from the original media, but before you start your computer, reinstall Windows NT 4.0 SP6a. You must reinstall SP6a before you reinstall the SRP because the SRP requires SP6a.

  3. Restart your computer.

  4. Reinstall the SRP.

  5. Restart your computer.

  6. Install other post-SP6a hotfixes as necessary.

    For additional information about how to install multiple hotfixes with only one reboot, click the article number below to view the article in the Microsoft Knowledge Base:
    Q296861 Use QChain.exe to Install Multiple Hotfixes with One Reboot
  7. Restart your computer.

For more information about the SRP, visit the following Microsoft Web site:
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/itsolutions/security/news/nt4srp.asp


MORE INFORMATION

Patches are available from the following Microsoft Web site (if your language is not listed, please check back):

http://www.microsoft.com/ntserver/nts/downloads/critical/q299444/default.asp
NOTE: This patch requires Windows NT 4.0 SP6a.

Release Date: July 26, 2001

For additional information about how to download Microsoft Support files, click the article number below to view the article in the Microsoft Knowledge Base:
Q119591 How to Obtain Microsoft Support Files from Online Services
Microsoft used the most current virus detection software available on the date of posting to scan this file for viruses. Once posted, the file is housed on secure servers that prevent any unauthorized changes to the file.

Fixes Included in the SRP

The SRP includes all post-SP6a fixes that have been delivered via Microsoft Security Bulletins. In addition, it also includes a small number of fixes that have not been previously discussed. Because security bulletins are disruptive to customers' normal maintenance procedures, Microsoft typically issues them only when a security issue poses an immediate danger to your systems. Issues that do not meet this standard are typically addressed through other delivery vehicles such as service packs or, in this case, the SRP.
Q241041 Enabling NetBT to Open IP Ports Exclusively
Q243649 Unchecked Print Spooler Buffer May Expose System Vulnerability
Q243835 How to Prevent Predictable TCP/IP Initial Sequence Numbers
Q244599 Fixes Required in TCSEC C2 Security Evaluation Configuration for Windows NT 4.0 Service Pack 6a
Q246045 Malformed Resource Enumeration Arguments May Cause Named Pipes and Other System Services to Fail
Q247869 Local Procedure Call May Permit Unauthorized Account Usage
Q248183 Syskey Tool Reuses Keystream
Q248185 Security Identifier Enumeration Function in LSA May Not Handle Argument Properly
Q248399 Shared Workstation Setup May Permit Access to Recycle Bin Files
Q249108 Registry Data Is Viewable By All Users During Rdisk Repair Update
Q249197 Internet Explorer Does Not Allow Use of Single SGC Certificate with 128-Bit Encryption for Virtual Sites
Q249863 SGC Connections May Fail from Domestic Clients
Q249973 Default RTF File Viewer Interrupts Normal Program Processing
Q250625 Default Registry Key Permissions May Allow Privilege Elevation
Q252463 Index Server Error Message Reveals Physical Location of Web Folders
Q257870 Malformed Print Request May Stop Windows 2000 TCP/IP Printing Service
Q259042 Handle Leak in WinLogon After Applying Windows NT 4.0 Service Pack 6
Q259496 Incorrect Registry Setting May Allow Cryptography Key Compromise
Q259622 Command Processor May Not Parse Excessive Arguments Properly
Q259728 Windows Hangs with Fragmented IP Datagrams
Q259773 Incorrect Response to Local Procedure Call Causes "Stop" Error Message
Q262388 Denial-of-Service Attack Possible from Linux RPC Client
Q262694 Malicious User Can Shut Down Computer Browser Service
Q264684 Patch for "Remote Registry Access Authentication" Vulnerability
Q265714 Windows NT 4.0 SNMP Registry Entries Are Readable
Q266433 Patch for Numerous Vulnerabilities in the LPC Port System Calls
Q267858 Memory Could Not Be Read Error Message While Doing File Operation
Q267861 RAS Registry Modification Allowed Without Administrative Rights
Q267864 MTS Package Administration Key Includes Information About Users
Q268082 DNS SOA Record May Reveal Administrator Account Name
Q269049 Registry-Invoked Programs Use Standard Search Path
Q269239 NetBIOS Vulnerability May Cause Duplicate Name on the Network Conflicts
Q271216 Fix for E-mail Issues Between 128-Bit and 56-Bit Encryption Using French Regional Settings
Q274835 Buffer Overflow in Network Monitor May Cause Vulnerability
Q275567 Multiple NetBT Sessions May Hang Local Host
Q276575 Patch Available for "Phone Book Service Buffer Overflow" Vulnerability
Q279336 Patch Available for Winsock Mutex Vulnerability
Q279843 Several Named Pipes Like NTSVCS and LSASS are Created Without Protection
Q280119 A Patch Is Available for the NTLMSSP Privilege Elevation Vulnerability
Q283001 Patch Available for Malformed PPTP Packet Stream Vulnerability
Q293818 Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard
Q294472 Index Server Search Function Contains Unchecked Buffer
Q296185 Patch Available for New Variant of the "Malformed Hit-Highlighting" Vulnerability
Q298012 Malformed RPC Request May Cause Service Failure
Q300972 Unchecked Buffer in Index Server ISAPI Extension Can Enable Web Server Compromise
Q303628 Relative Path Issue Can Run Program Under System Context

IIS Fixes Included in the SRP

Q188348 Specially-Malformed FTP Requests May Create Denial of Service
Q233335 Page Contents Visible When Certain Characters are at End of URL
Q234905 Improperly Formatted HTTP Request May Cause INETINFO Process to Fail
Q238349 Specially-Malformed Header in GET Request Creates Denial of Service
Q238606 Page Contents Visible When Certain Dot Extensions Present in the Virtual Directory Name
Q241805 Combined FTP and Domain Restriction Security Patch for IIS 4.0
Q244613 IIS 4.0 SSL ISAPI Filter Can Leak Single Buffer of Plaintext
Q246401 IIS May Improperly Parse Specific Escape Characters
Q249599 Virtual Directory Mapped to UNC Returns Server-Side Script Code When URL Contains Additional Characters at the End of the Request
Q252693 Chunked Encoding Request with No Data Causes IIS Memory Leak
Q254142 100% CPU Usage Occurs When You Send a Large Escape Sequence
Q260205 HTTP Request with a Large Number of Dots or Dot-Slashes Causes High CPU Utilization
Q260347 IIS 4: Fix for Cross-Site Scripting Issues
Q260838 IIS Stops Servicing HTR Requests
Q267559 GET on HTR File Can Cause a "Denial of Service" or Enable Directory Browsing
Q269862 Patch Released for Canonicalization Error Issue
Q271652 Patch Released for Malformed URL Vulnerability That Disables Web Server Response
Q274149 Cookies Are Not Marked as Secure in IIS
Q277873 Patch Available for "Web Server File Request Parsing" Vulnerability
Q280322 FPSE: Patch for Malformed Web Form Submission Security Vulnerability
Q285985 Patch Available for New Variant of File Fragment Reading via .HTR Vulnerability
Q295534 Superfluous Decoding Operation Can Allow Command Execution Through IIS

Additional query words: security_patch

Keywords : kbWinNT400PreSP7Fix
Issue type : kbinfo
Technology : kbWinNTsearch kbWinNTWsearch kbWinNTW400search kbWinNT400xsearch kbWinNTSsearch kbWinNTSEntSearch kbWinNTS400sp6 kbWinNTS400xsearch kbWinNTSEnt400SP6a kbWinNTW400SP6a


Last Reviewed: July 30, 2001
2001 Microsoft Corporation. All rights reserved. Terms of Use.


Article ID: Q299444

Last Reviewed:
July 30, 2001

Send to a friend

Provided by
Microsoft Product Support Services


Did the information in this article help answer your question?

Yes
No
Did not apply

Please provide additional comments about this information.
(255 character max)