![]() |
![]() |
|
![]() |
![]() |
|
Software Rat & Tat bei Softwareproblemen |
![]() |
|
Themen-Optionen | Ansicht |
![]() |
#1 |
Super-Moderator
![]() |
![]() http://www.heise.de/newsticker/data/ps-27.07.01-000/
das wurde verbessert: http://support.microsoft.com/support.../q299/4/44.asp Q241041 Enabling NetBT to Open IP Ports Exclusively Q243649 Unchecked Print Spooler Buffer May Expose System Vulnerability Q243835 How to Prevent Predictable TCP/IP Initial Sequence Numbers Q244599 Fixes Required in TCSEC C2 Security Evaluation Configuration for Windows NT 4.0 Service Pack 6a Q246045 Malformed Resource Enumeration Arguments May Cause Named Pipes and Other System Services to Fail Q247869 Local Procedure Call May Permit Unauthorized Account Usage Q248183 Syskey Tool Reuses Keystream Q248185 Security Identifier Enumeration Function in LSA May Not Handle Argument Properly Q248399 Shared Workstation Setup May Permit Access to Recycle Bin Files Q249108 Registry Data Is Viewable By All Users During Rdisk Repair Update Q249197 Internet Explorer Does Not Allow Use of Single SGC Certificate with 128-Bit Encryption for Virtual Sites Q249863 SGC Connections May Fail from Domestic Clients Q249973 Default RTF File Viewer Interrupts Normal Program Processing Q250625 Default Registry Key Permissions May Allow Privilege Elevation Q252463 Index Server Error Message Reveals Physical Location of Web Folders Q257870 Malformed Print Request May Stop Windows 2000 TCP/IP Printing Service Q259042 Handle Leak in WinLogon After Applying Windows NT 4.0 Service Pack 6 Q259496 Incorrect Registry Setting May Allow Cryptography Key Compromise Q259622 Command Processor May Not Parse Excessive Arguments Properly Q259728 Windows Hangs with Fragmented IP Datagrams Q259773 Incorrect Response to Local Procedure Call Causes "Stop" Error Message Q262388 Denial-of-Service Attack Possible from Linux RPC Client Q262694 Malicious User Can Shut Down Computer Browser Service Q264684 Patch for "Remote Registry Access Authentication" Vulnerability Q265714 Windows NT 4.0 SNMP Registry Entries Are Readable Q266433 Patch for Numerous Vulnerabilities in the LPC Port System Calls Q267858 Memory Could Not Be Read Error Message While Doing File Operation Q267861 RAS Registry Modification Allowed Without Administrative Rights Q267864 MTS Package Administration Key Includes Information About Users Q268082 DNS SOA Record May Reveal Administrator Account Name Q269049 Registry-Invoked Programs Use Standard Search Path Q269239 NetBIOS Vulnerability May Cause Duplicate Name on the Network Conflicts Q271216 Fix for E-mail Issues Between 128-Bit and 56-Bit Encryption Using French Regional Settings Q274835 Buffer Overflow in Network Monitor May Cause Vulnerability Q275567 Multiple NetBT Sessions May Hang Local Host Q276575 Patch Available for "Phone Book Service Buffer Overflow" Vulnerability Q279336 Patch Available for Winsock Mutex Vulnerability Q279843 Several Named Pipes Like NTSVCS and LSASS are Created Without Protection Q280119 A Patch Is Available for the NTLMSSP Privilege Elevation Vulnerability Q283001 Patch Available for Malformed PPTP Packet Stream Vulnerability Q289246 Forged SID Could Result in Elevated Privileges in Windows NT 4.0 Q293818 Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard Q294472 Index Server Search Function Contains Unchecked Buffer Q296185 Patch Available for New Variant of the "Malformed Hit-Highlighting" Vulnerability Q300972 Unchecked Buffer in Index Server ISAPI Extension Can Enable Web Server Compromise Q303628 Relative Path Issue Can Run Program Under System Context IIS Fixes Included in the SRP Q188348 Specially-Malformed FTP Requests May Create Denial of Service Q233335 Page Contents Visible When Certain Characters are at End of URL Q234905 Improperly Formatted HTTP Request May Cause INETINFO Process to Fail Q238349 Specially-Malformed Header in GET Request Creates Denial of Service Q238606 Page Contents Visible When Certain Dot Extensions Present in the Virtual Directory Name Q241805 Combined FTP and Domain Restriction Security Patch for IIS 4.0 Q244613 IIS 4.0 SSL ISAPI Filter Can Leak Single Buffer of Plaintext Q246401 IIS May Improperly Parse Specific Escape Characters Q249599 Virtual Directory Mapped to UNC Returns Server-Side Script Code When URL Contains Additional Characters at the End of the Request Q252693 Chunked Encoding Request with No Data Causes IIS Memory Leak Q254142 100% CPU Usage Occurs When You Send a Large Escape Sequence Q260205 HTTP Request with a Large Number of Dots or Dot-Slashes Causes High CPU Utilization Q260347 IIS 4: Fix for Cross-Site Scripting Issues Q260838 IIS Stops Servicing HTR Requests Q267559 GET on HTR File Can Cause a "Denial of Service" or Enable Directory Browsing Q269862 Patch Released for Canonicalization Error Issue Q271652 Patch Released for Malformed URL Vulnerability That Disables Web Server Response Q274149 Cookies Are Not Marked as Secure in IIS Q277873 Patch Available for "Web Server File Request Parsing" Vulnerability Q280322 FPSE: Patch for Malformed Web Form Submission Security Vulnerability Q285985 Patch Available for New Variant of File Fragment Reading via .HTR Vulnerability Q295534 Superfluous Decoding Operation Can Allow Command Execution Through |
![]() |
![]() |
![]() |
#2 |
bitte Mailadresse prüfen!
Registriert seit: 03.04.2001
Beiträge: 2.387
|
![]() Geht des auch mit Windowsupdate oder muaß i des Servicepack herunterladen?
Hab nämlich bei meinem Server keinen IE installiert, und Windowsupdate geht ja nur mit IE. |
![]() |
![]() |
![]() |
#3 |
Inventar
![]() Registriert seit: 04.09.2000
Beiträge: 2.249
|
![]() Es gibt fürs SP die Expressmöglichkeit: http://www.microsoft.com/ntserver/nt.../x86DLType.asp
Den neuen Pack musst komplett saugen.
____________________________________
lies es, lern es, lebe danach |
![]() |
![]() |
![]() |
Aktive Benutzer in diesem Thema: 1 (Registrierte Benutzer: 0, Gäste: 1) | |
|
|