Bugtraq mailing list archives
Correction to Microsoft Security Bulletin MS99-025
From: aleph1 () UNDERGROUND ORG (aleph1 () UNDERGROUND ORG)
Date: Tue, 20 Jul 1999 15:02:51 -0700
The following is a Security Bulletin from the Microsoft Product Security Notification Service. Please do not reply to this message, as it was sent from an unattended mailbox. ******************************** Microsoft Security Bulletin MS99-025 (http://www.microsoft.com/security/bulletins/MS99-025.asp), which was released on July 19, 1999, discussed a vulnerability associated with Internet Information Server and Microsoft Data Access Components. The Frequently Asked Questions (FAQ) page for this bulletin (http://www.microsoft.com/security/bulletins/MS99-025faq.asp) provided instructions on how to manually change the registry in order to protect vulnerable systems, and also provided an automated method for making the changes. However, we have discovered that the automated method is incorrect. If you manually changed the registry entries as discussed in the bulletin, you do not need to take any further action. All of the information in the bulletin and FAQ regarding registry keys is correct. However, if you downloaded HANDUNSF.REG and used it to automatically change the registry, you should download the corrected file and run it on all affected systems. The corrected file is named HANDSAFE.REG, in order to make it easy to tell that you are using the right file. The file can be downloaded from the FAQ page; the link to the file is contained in the answer to "I have MDAC 2.x installed, what should I do?". Even if you are not affected by this error, we recommend that you review the FAQ page again. We have made a number of changes to the original version of the FAQ, in order to provide a clearer description of the security vulnerability and the steps that customers should take. We regret the error and any inconvenience that it has caused. We are taking steps to ensure that the problem will not happen again. Sincerely, The Microsoft Product Security Team ******************************************************************* You have received this e-mail bulletin as a result of your registration to the Microsoft Product Security Notification Service. You may unsubscribe from this e-mail notification service at any time by sending an e-mail to MICROSOFT_SECURITY-SIGNOFF-REQUEST () ANNOUNCE MICROSOFT COM The subject line and message body are not used in processing the request, and can be anything you like. For more information on the Microsoft Security Notification Service please visit http://www.microsoft.com/security/services/bulletin.asp. For security-related information about Microsoft products, please visit the Microsoft Security Advisor web site at http://www.microsoft.com/security.
Current thread:
- Re: Mail relay vulnerability in RedHat 5.0, 5.1, 5.2, (continued)
- Re: Mail relay vulnerability in RedHat 5.0, 5.1, 5.2 Matt Dunn (Jul 22)
- Re: Mail relay vulnerability in RedHat 5.0, 5.1, 5.2 Daniele Orlandi (Jul 24)
- Re: Mail relay vulnerability in RedHat 5.0, 5.1, 5.2 Matt Dunn (Jul 22)
- Re: Shared memory DoS's Glynn Clements (Jul 16)
- Re: Shared memory DoS's Mike Perry (Jul 16)
- Re: Shared memory DoS's Howard Kaye (Jul 19)
- Samba 2.0.5 security fixes Andrew Tridgell (Jul 20)
- Re: Shared memory DoS's Richard Shetron (Jul 20)
- Delegate creates directories writable for anyone Olaf Seibert (Jul 21)
- Administrivia Aleph One (Jul 22)
- SNMP communities in 3Com HiPer Arcs (maybe other 3Com products?) Jeff Mcadams (Jul 20)
- Correction to Microsoft Security Bulletin MS99-025 aleph1 () UNDERGROUND ORG (Jul 20)