[16659] in bugtraq

home help back first fref pref prev next nref lref last post

Invalid URL vulnerability & SP4 > (Additional Information)

daemon@ATHENA.MIT.EDU (Givens, Mike)
Fri Sep 8 11:59:37 2000

MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Message-ID:  <C15FD15B6FE7D21196DE0000F8C9918207969342@CC-EXCH3>
Date:         Fri, 8 Sep 2000 09:10:11 -0500
Reply-To: "Givens, Mike" <MGivens@AEGONUSA.COM>
From: "Givens, Mike" <MGivens@AEGONUSA.COM>
To: BUGTRAQ@SECURITYFOCUS.COM

Here is something I received from the "other" bugtraq list I belong to.
Thought anyone
working on NT should/would like to know this !

Mike

******************************
Post From: Karl Knibbs

Just a quick note regarding MS00-063 (invalid URL vulnerability) and Service
Pack 4. It don't work!

Having obtained the fix from product support I went through my usual round
of testing on my development servers before updating production servers. On
both of my servers still on SP4 the replaced kernel caused a STOP on boot.
On contacting PSS it was confirmed (eventually) that this is a post SP6a
fix. This however is not noted in the security bulletin.

Recovery of these machines was quite a simply affair of replacing the
kernel32.dll in system32 with the back-up placed in the
winnt\$NtUninstallQ271652$ dir.

I have not as of yet tested with SP5 although I have applied to several SP6a
machines without problems.

home help back first fref pref prev next nref lref last post