The Active Network

ActiveWin: Win 2000 Active NetworkIntro | History | Links | FAQ | Mailing List | Forums 

Amazon.com

  *  

ActiveWin2k

Critical Patches

Here you will find some useful patches for Windows 2000.  If you know of any patches that might belong in this section please email us with the details.

Current
Included With Service Pack 3
Included With 2002 Security Rollup
Included With Service Pack 2
Included With Service Pack 1

Current:

810649: Critical Update
This update contains several fixes to Windows components to better support default Web browsers other than Internet Explorer, as described in Microsoft Knowledge Base (KB) Article 810649. Download now to improve the interaction of certain Windows components with default web browsers other than Internet Explorer.

Q329170: Security Update
A security vulnerability has been identified that could allow an attacker to disrupt a facility by which security settings are applied to Windows-based computers in a corporate network. This could allow the attacker to loosen settings on his or her own computer or impose tighter ones on someone else's. Network administrators can help eliminate this issue by installing this update.

Windows 2000 Security Patch: Microsoft Virtual Machine Security Update
This update resolves vulnerabilities in Microsoft virtual machine (Microsoft VM).

Q329115: Security Update
This update resolves the "Certificate Validation Flaw Could Enable Identity Spoofing" vulnerability in Windows 2000. Download now to help prevent an attacker from attempting identity spoofing using certificates.

Q323255: Security Update
This update resolves the "Unchecked buffer in HTML Help can lead to Code Execution" security vulnerability in Windows 2000. Download now to help prevent a malicious user from running an unauthorized program on your computer.

Q323172: Security Update
This update resolves the "Flaw in Digital Certificate Enrollment Component Allows Certificate Deletion" security vulnerability in Windows 2000. Download now to help stop a Web site or HTML e-mail from deleting digital certificates on your computer and preventing you from using the services they are associated with.

Q326830: Security Update
This update resolves the "Unchecked Buffer in Network Share Provider can lead to Denial of Service" vulnerability in Windows 2000. Download now to help prevent a malicious user from launching a denial of service (DoS) attack on your computer.

Q326886: Security Update
This update resolves the "Flaw in Network Connection Manager" security vulnerability in Windows 2000. Download now to help prevent a malicious user from gaining elevated privileges through the Network Connection Manager, and then running code of his or her choice on your computer.

Included in Service Pack 3(Service Pack 3 Also Includes All Fixes from SP 1 & 2):

Q311967: Security Update
This update resolves the "Unchecked buffer in the Multiple UNC Provider" security vulnerability in Windows 2000, and is discussed in Microsoft Security Bulletin MS02-017. Download now to help prevent a malicious user from exploiting a buffer overflow vulnerability to either cause your computer to restart or to run unauthorized programs on your computer.

Security Update, February 12, 2002
This update resolves the "Unchecked Buffer in SNMP Service Could Enable Arbitrary Code to be Run" security vulnerability in Windows 2000, and is discussed in Microsoft Security Bulletin MS02-006. Download now to help prevent a malicious user from running code of his or her choice or launching a denial of service (DoS) attack on your computer.


Security Update, August 17, 2001
This cumulative security update includes every update released for Internet Information Server (IIS) 5.0, and is discussed in Microsoft Security Bulletin MS01-044. Download now to keep IIS 5.0 updated with the latest security fixes.

Q319733: Internet Information Services Security Roll-up Package
This update addresses several newly discovered security vulnerabilities affecting Internet Information Services (IIS) 5.0, as well as incorporating all previous updates for IIS. This update is discussed in Microsoft Security Bulletin MS02-018.

Q318138: Security Update
This update resolves the "Unchecked Buffer in Remote Access Service Phonebook Could Lead to Code Execution" security vulnerability in Windows 2000. This vulnerability is the result of an unchecked buffer in the Remote Access Service (RAS) Phonebook. Download now to eliminate this vulnerability by instituting proper input checking on the RAS phonebook entries.

Q318593: Security Update (Windows 2000 Domain Controller)
This update resolves the "Opening Group Policy Files for Exclusive Read Access Blocks Policy Application" issue affecting Windows 2000 domain controllers, and is discussed in Microsoft Security Bulletin MS02-016. Download now to prevent an attacker from blocking the application of Group Policy within a Windows 2000 domain.

Security Update, March 7, 2002
This update resolves the "Unchecked Buffer in Windows Shell Could Lead to Code Execution" security vulnerability in Windows 2000, and is discussed in Microsoft Security Bulletin MS02-014. Download now to help prevent a malicious user from running programs on your computer.

Security Update, February 7, 2002
This update resolves the "Unchecked Buffer in Telnet Server Can Lead to Arbitrary Code Execution" security vulnerability in Windows 2000 and Interix 2.2, and is discussed in Microsoft Security Bulletin MS02-004. Download now to help prevent a malicious user from causing your Telnet server session to fail, or from running unauthorized code on your computer.

Included in 2002 Security Rollup:

Security Update, October 18, 2001
This update eliminates the "Invalid RDP Data can Cause Terminal Service Failure" vulnerability in computers running Windows 2000, and is discussed in Microsoft Security Bulletin MS01-052. Download now to help prevent a malicious user from causing your server to fail.

Security Update, August 23, 2001
This update resolves a denial of service vulnerability in Windows 2000 computers running the Network News Transfer Protocol (NNTP) service, and is discussed in Microsoft Security Bulletin MS01-043. Download now help prevent a malicious user from disrupting the operation of your server.

Security Update, June 18, 2001
This update resolves the "Unchecked Buffer in Index Server ISAPI Extension Could Enable Web Server Compromise" security vulnerability in Windows 2000 computers running Internet Information Service (IIS) 5.0, and is discussed in Microsoft Security Bulletin MS01-033. Download now help prevent a malicious user from taking control of your Web server.

Security Update, June 7, 2001
This update addresses the "Predicatable Name Pipes Could Enable Privilege Elevation via Telnet" security vulnerability in the Windows 2000 Telnet service that is discussed in Microsoft Security Bulletin MS01-031. Download now to help prevent a malicious user from launching programs on your computer, gaining access to your network or initiating a denial of service attack against your computer.

Security Update, May 14, 2001
This cumulative update includes all the updates that have been released for Internet Information Service (IIS) 5.0, including three new updates, and is discussed in Microsoft Security Bulletin MS01-026. Download now to update IIS 5.0 with the latest security fixes.

Security Update, May 10, 2001
This update addresses the "Malformed Hit-Highlighting" security vulnerability in Windows 2000 computers running Indexing Service, and is discussed in Microsoft Security Bulletin MS01-025. Download now to help prevent a malicious user from reading files on your Web server.

Security Update, August 19, 2001
This update resolves the "Malformed Data Frame Sent to a Windows 2000 Computer Through an Infrared Port Causes Stop Error" security vulnerability in Windows 2000, and is discussed in Microsoft Security Bulletin MS01-046. Download now to help prevent a malicious user from causing your computer to crash by sending a malformed data frame to your computer's infrared port.

Security Update, July 6, 2001
This update addresses the "Windows 2000 SMTP Mail Relaying" security vulnerability in the Windows 2000 Simple Mail Transfer Protocol (SMTP) service and is discussed in Microsoft Security Bulletin MS01-037. Download now to help prevent malicious users from relaying e-mail messages from your computer.

Security Update, June 26, 2001
This update resolves the "Function Exposed via LDAP over SSL Could Enable Passwords to be Changed " security vulnerability in Windows 2000 Server and Windows 2000 Advanced Server, and is discussed in Microsoft Security Bulletin MS01-036. Download now to help prevent a malicious user from changing another user's domain password.

Security Update, June 22, 2001
This update resolves the "NetMeeting Desktop Sharing" security vulnerability in Windows 2000, and is discussed in Microsoft Security Bulletin MS00-077. Download now to help prevent a malicious user from denying or interrupting NetMeeting® conferencing software services.

Security Update, February 12, 2001
This update resolves the "Malformed Event Record" security vulnerability in Windows 2000, and is discussed in Microsoft Security Bulletin MS01-013. Download now to help prevent a malicious user from running unauthorized code on your computer.

Security Update, February 5, 2001
This update resolves the "Network DDE Agent Request" security vulnerability in Windows 2000, and is discussed in Microsoft Security Bulletin MS01-007. Download now to increase security and help prevent a malicious user from running code to take control of your computer.

Security Update, October 24, 2000
This update resolves the "HyperTerminal Buffer Overflow" security vulnerability in Windows 2000. If you receive and open an HTML e-mail message that contains a particularly malformed Web address (URL), the URL can be used to exploit this vulnerability and run arbitrary code on your computer.

Included in Service Pack 2(Service Pack 2 Also Includes All Fixes from SP 1):

Security Update, May 1, 2001
This update resolves the "Unchecked Buffer in ISAPI Extension Could Enable Compromise of IIS 5.0 Server" security vulnerability in Windows 2000 and is discussed in Microsoft Security Bulletin MS01-023. Download now to help prevent a malicious user from taking control of your Web server.

Security Update, April 2, 2001
This update resolves the "Erroneous VeriSign-Issued Digital Certificates Pose Spoofing Hazard" security vulnerability, and is discussed in Microsoft Security Bulletin MS01-017. Download now to prevent an unauthorized user from running code on your computer by digitally signing programs as "Microsoft Corporation."

Security Update, March 13, 2001
This update resolves the "Malformed WebDAV Request Can Cause IIS to Exhaust CPU Resources" security vulnerability in Internet Information Services (IIS) 5.0, and is discussed in Microsoft Security Bulletin MS01-016. Download now to help prevent a malicious user from temporarily disrupting your Web services

Security Update, February 23, 2001
This update resolves the "Malformed URL can cause Service Failure in IIS 5.0 and Exchange 2000" security vulnerability in Internet Information Server (IIS) 5.0 and Exchange 2000, and is discussed in Microsoft Security Bulletin MS01-014. Download now to help prevent a malicious user from causing IIS 5.0 to fail.

Security Update, February 1, 2001
This update resolves the "Invalid RDP Data" security vulnerability in Windows 2000 terminal servers, and is discussed in Microsoft Security Bulletin MS01-006. Download now to prevent a malicious user from sending a specific series of data packets to your server, causing it to fail. *Included in SP2

Security Update, January 30, 2001
This update resolves the "VM File Reading" security vulnerability in the Microsoft virtual machine (Microsoft VM). Download now to prevent a malicious Web site operator from reading the files on your computer or viewing the Web content inside your intranet. *Included in SP2

Security Update, January 16, 2001
This update resolves the "Web Client NTLM Authentication" security vulnerability in Windows 2000 and Office 2000. Under specific conditions, this vulnerability allows a malicious Web site operator to obtain the cryptographically protected logon credentials of a visiting user because the security settings for the Web Extender Client (WEC) are set to incorrect levels, which allows your computer to send information about your authentication credentials to remote Web applications. Download now to ensure that your WEC components are set to the recommended Internet Explorer security levels, to prevent a malicious Web site operator from capturing your logon credentials. *Included in SP2

Security Update, January 5, 2001
This update resolves the "Malformed Web Form Submission" security vulnerability in FrontPage Server Extensions (FPSE) that ship as part of Internet Information Services (IIS) 5.0. FPSE is a set of programs that run on an IIS Web server, and administrators can use FPSE to manage and develop content for a Web site. The component of FPSE that provides support for the processing of Web forms may process malformed submissions incorrectly. If a malicious user creates a specially malformed Web form and submits it to an affected server, the IIS service could fail. If this occurs, the IIS service automatically restarts, but any Web sessions that are in progress at the time of an attack are lost. Download now to prevent a malicious user from disrupting the operation of your Web server. *Included in SP2

Security Update, December 20, 2000
This update resolves the "Indexing Service File Enumeration" vulnerability in Indexing Service 3.0. An ActiveX control that is shipped with Indexing Service is incorrectly marked as "safe for scripting." The control makes it possible for Web applications and other programs to list the names of files and folders on a Windows 2000 computer. Because this control is marked "safe for scripting," a malicious Web site operator could use the control to gather the names and properties of files and folders on an affected visiting user's computer. Download now to prevent a malicious Web site operator from gathering information about your files and folders. *Included in SP2

Security Update, December 7, 2000
This update resolves the "Phone Book Service Buffer Overflow" security vulnerability in Windows 2000. The Phone Book Service that runs on Internet Information Services (IIS) 5.0 has an unchecked buffer (a temporary data storage area) in the code that processes requests for phone book updates. A specifically malformed HTTP request from a malicious user can cause a buffer overflow in the Phone Book Service, which might allow the malicious user to run unauthorized code on the server, or cause the service to fail. Download now to prevent a malicious user from running code to add, change, or delete data on your Web server. *Included in SP2

Security Update, November 27, 2000
This update resolves the "Domain Account Lockout" security vulnerability in Windows 2000. Under very specific conditions, a malicious user can try repeatedly to guess an account password, even if the domain administrator has set the Account Lockout Policy to disable the account after a specified number of attempts to access it. Download now to ensure the Account Lockout Policy helps prevent unauthorized access to the computers in your network. *Included in SP2

Security Update, November 10, 2000
This update resolves the "Web Server File Request Parsing" security vulnerability in Internet Information Services (IIS) 5.0. When a Web server that is running IIS receives a request for a file, it passes the name of the file to the operating system for processing. If a malicious user combines a request for a .cmd or .bat file with operating system commands in a particular way, IIS improperly passes both the file request and the commands to the operating system. This could allow the malicious user to run commands directly on the Web server. Download now to prevent a malicious user from modifying Web pages, adding, changing, or deleting files by sending malformed file requests. Note This update has been revised as of November 20, 2000. Microsoft recommends that you install this version of the update. *Included in SP2

Security Update, November 5, 2000
This update resolves the "Indexing Services Cross Site Scripting" vulnerability in Indexing Services for Windows 2000. The Indexing Services is a search engine that is integrated with Internet Information Services 5.0 (IIS 5.0) and Windows 2000 that allows browsers to perform full-text searches of Web sites. Indexing Services does not properly validate all search inputs before processing them, and is consequently vulnerable to Cross-Site Scripting (CSS). CSS allows a malicious user to "inject" code into another person's Web session. If a malicious user is successful in exploiting this vulnerability, a Web site hosted by your server can be used to run code on a visting user's browser each time it returns to your Web site. Download now to prevent a malicious user from introducing code on your Web server, and returning it as a Web page to a visiting browser. *Included in SP2  

Security Update, November 3, 2000
This update resolves the "NetMon Protocol Parsing" security vulnerability in Windows 2000 and Systems Management Server (SMS). Network Monitor (NetMon) is an administrative tool that is used to monitor network traffic. If malformed data is sent over a network that an administrator is monitoring, it could overrun the buffer (a temporary data storage area on your computer) and either cause the NetMon to fail, or cause code of the sender?s choice to run on the computer that is under the administrator's control. Download now to prevent a malicious user from causing your computer's buffer to overflow. *Included in SP2  

Security Update, October 27, 2000
This update resolves the "Session ID Cookie Marking" security vulnerability in Internet Information Services (IIS) 5.0. When using .asp files, IIS cannot differentiate between secure and non-secure Session ID cookies (small data files that identify you to a Web site as you move around within that site). This update enables .asp files to mark Session ID cookies as "secure." Download now to prevent a malicious user from connecting to the Web page you are viewing, assuming your identity, and placing orders or viewing your personal information. Note This update has been revised as of November 20, 2000. Microsoft recommends that you install this version of the update. *Included in SP2

Security Update, October 17, 2000
This update resolves the "NetMeeting Desktop Sharing" security vulnerability in Windows NT® 4.0 and Windows 2000. When Remote Desktop Sharing is enabled, NetMeeting does not handle a particular kind of malformed input string correctly, when it is sent from a client. If an affected computer received such data, it could temporarily cause the NetMeeting application to stop responding and temporarily drive CPU utilization to 100 percent, resulting in the loss of any session that was in progress at the time. Download now to prevent a malicious user from denying or interrupting NetMeeting services. *Included in SP2

Security Update, October 7, 2000
This update resolves the "Multiple LPC and LPC Ports" security vulnerability in Windows 2000 and Windows NT® 4.0. Local Procedure Call (LPC) is a message-passing service provided by Windows NT 4.0 and Windows 2000. LPC ports are channels within LPC that allow threads (a series of messages that have been posted as replies to each other) within a communication process to coordinate LPC requests. Windows 2000 and Windows NT 4.0 are unable to handle unexpected LPCs properly. If a malicious user makes process requests in an invalid order, or uses invalid parameters, it could cause your computer to fail or permit a malicious user to impersonate your privileges and eavesdrop. Download now to prevent a malicious user from causing your computer to fail, impersonating your privileges, or causing the client or server to fail by posing as the client or server and sending random data. *Included in SP2

Security Update, October 6, 2000
This update resolves the "Simplified Chinese IME State Recognition" security vulnerability in Windows 2000. The Input Method Editor (IME) for Simplified Chinese inappropriately exposes functionality when it is used as part of a computer's logon screen. Download now to prevent a malicious user from exploiting the logon screen for Simplified Chinese IME to run code, add users to the computer, install or remove system components, add or remove software and compromise data. *Included in SP2

Security Update, September 16, 2000
This update resolves the "Windows 2000 Telnet Client NTLM Authentication" security vulnerability in Windows 2000. NT LanMan (NTLM) is an authentication process that is used to prove a client?s identity on a network. Windows 2000 includes a Telnet client that is capable of using NTLM authentication when it connects to a remote NTLM-enabled Telnet server. A malicious user who operates a Telnet server could initiate a session with another computer and collect the computer's NTLM authentication credentials. These credentials could be subjected to an offline attack to discover the user?s clear-text password. Download now to prevent a malicious user from acquiring your authentication credentials. *Included in SP2

Security Update, September 10, 2000
This update resolves the "Malformed RPC Packet" security vulnerability in Windows 2000. In order to exploit this vulnerability, a malicious Remote Procedure Call (RPC) client would have to send a malformed RPC packet to a Windows 2000 server. On receiving the malformed RPC packet, the server stops responding to client requests. Download this update to prevent a malicious user from launching a Denial of Service attack via the RPC client. *Included in SP2

Security Update, September 9, 2000
This update resolves the "Still Image Service Privilege Escalation" security vulnerability in Windows 2000. The Still Image Service is automatically installed when a still image device (such as a digital camera or scanner) is attached to the Windows 2000 host. There is an unchecked buffer in the Still Image Service that may allow a malicious program to obtain LocalSystem privileges. Download now to prevent a malicious user from logging on to a Windows 2000 computer interactively and running a program that could enable the malicious user to obtain administrative privileges on the host.*Included in SP2

Security Update, September 2, 2000
This update resolves the "Local Security Policy Corruption" security vulnerability in Windows 2000. Download now to prevent a malicious user from corrupting parts of your computer's local security policy and disabling your network access. If a malicious user has logon access to a network computer and corrupts its network security policy, that computer will no longer be able to log onto a domain, request files from a file server, or share files with other computers. If the affected computer is a domain controller, exploiting this vulnerability can disrupt all network operations. (Fix Included with SP1)

Security Update, August 21, 2000
This update resolves the "Service Control Manager Named Pipe Impersonation" security vulnerability in Windows 2000. The Service Control Manager (SCM) is an administrative tool provided in Windows 2000 that allows system services like Server, Workstation, Alerter, ClipBook, and others to be created or modified. The SCM creates a named pipe for each service as it starts. Download now to prevent a malicious user from creating or predicting pipes that allow impersonation of your specific user or LocalSystem privileges. *Included in SP2

Security Update, August 19, 2000
This update resolves the "Telnet Server Flooding" security vulnerability in Microsoft Windows 2000. Download now to prevent a malicious user from sending invalid input information to your Telnet Server. Although the Telnet service is provided as part of Windows 2000, the service is not enabled by default, and users who have not enabled it are not at risk. *Included in SP2

Security Update, August 17, 2000
This update resolves the "Relative Shell Path" security vulnerability in Microsoft Windows 2000. Install this update to prevent malicious users from substituting the code of their choice for the file Explore.exe, which creates the Windows desktop you interact with on your computer. If the Explorer.exe code has been replaced with substituted code, it persists for every subsequent user that logs on to your computer. A malicious user would have to be able to log on to your computer at the keyboard to exploit this vulnerability *Included in SP2

Security Update, August 15, 2000
This update resolves the "File Permission Canonicalization" security vulnerability in Internet Information Services (IIS). Download now to prevent a malicious user from gaining permission to use Internet Server Application Programming Interface (ISAPI) files hosted on a Web server.
*Included in SP2

Included in Service Pack 1:

Security Update, August 23, 2000
This update resolves the "Specialized Header" vulnerability in Internet Information Services (IIS) 5.0, which ships with Windows 2000. Download now to help prevent a malicious user from exploiting this vulnerability and causing your Web server to send the source code of .asp or .htr files to a visiting browser. Security recommendations advise against ever including sensitive information in .asp or .htr files.

Security Update, August 20, 2000
This update resolves the "Protected Store Key Length" security vulnerability in Windows 2000. Download now to help prevent a malicious user from compromising sensitive information on your computer. An attacker must have complete administrative control over your computer in order to exploit this vulnerability.

Critical Update, July 26, 2000
This update resolves the issue, "Component Object Model Plus (COM+) Process Leaks in Memory due to COM+ Objects not Being Released" in Windows 2000. When custom applications use COM+ objects, they are released properly in Windows NT® but may result in memory leaks when they are released in Windows 2000. These memory leaks may eventually require stopping the program to resolve the issue.

Security Update, July 17, 2000
This update resolves two security vulnerabilities in Internet Information Server (IIS) 5.0 and IIS 4.0, the "Absent Directory Browser Argument" vulnerability and the "File Fragment Reading via .HTR" vulnerability. Installing this update will prevent a malicious user from exploiting these vulnerabilities to slow performance on an affected Web server or, under very specific conditions, obtain the source code of certain types of files on a Web server. The referenced .HTR files are scripts that Windows NT users can employ to change passwords, and that administrators can use to perform a variety of password administration functions. Neither of these vulnerabilities allows data to be changed, added, or deleted on the server, nor do they allow administrative control over the affected computer. *Included in SP1

Critical Update, June 8, 2000
For Windows 2000, Japanese language-version only. This update resolves the "Fixed Font does not Align Properly when using Double-Byte Character Set" issue in the Japanese language-version of Windows 2000. When you use a fixed pitch font, such as MS Gothic or MS Mincho, the fonts may not be aligned properly on your monitor or printer. Note This update has been revised since its original release. Microsoft recommends that all users who are running the Japanese language-version of Windows 2000 install this updated version. *Included in SP1

Security Update, June 6, 2000
This update resolves the "ResetBrowser Frame" and "HostAnnouncement Flooding" security vulnerabilities in Windows 2000 and Windows NT 4.0. Installing this update will prevent a malicious user from denying network users the ability to locate services or other computers on the network. Without this update, the malicious user may also be able to provide inaccurate information to network users. *Included in SP1

Security Update, June 3, 2000
This update resolves the "Malformed Environment Variable" security vulnerability in Windows 2000 and Windows NT 4.0. Installing this update will prevent a malicious user from consuming available memory on an affected server, which can slow down or stop the server's ability to respond. The vulnerability would not allow a malicious user to compromise data on the computer or take over administrative control. *Included in SP1

Security Update, June 1, 2000
This update resolves the "Mixed Object Access" security vulnerability in Windows 2000. Installing this update will prevent a malicious user from modifying information in the Active Directory. This vulnerability can only be exploited under very specific conditions, by a user who already has authority to modify information in the Active Directory. Only Windows 2000 domain controllers are affected by the vulnerability, and Windows 2000 auditing allows administrators to determine who made the change. *Included in SP1

Security Update, May 30, 2000
This update resolves two security vulnerabilities in Internet Information Server (IIS) 5.0 and IIS 4.0, the "Undelimited .HTR Request" vulnerability and the "File Fragment Reading via .HTR" vulnerability. Installing this update will prevent a malicious user from exploiting these vulnerabilities to slow performance on an affected Web server or, under very specific conditions, obtain the source code of certain types of files on a Web server. The referenced .HTR files are scripts that Windows NT users can employ to change passwords, and that administrators can use to perform a variety of password administration functions. Neither of these vulnerabilities allows data to be changed, added, or deleted on the server, nor do they allow administrative control over the affected computer. *Included in SP1

Security Update, May 26, 2000
This update resolves the "Malformed Extension Data in URL" security vulnerability in Internet Information Server (IIS) 5.0 and IIS 4.0. Installing this update will prevent a malicious user from slowing or temporarily stopping performance on your Web server. If the URL used by a malicious user to request a file on your Web server contained malformed file extension data, the server could become unresponsive. The vulnerability does not cause the server to fail, nor does it allow a malicious user to compromise data on the computer or to take administrative control over it. *Included in SP1

Security Update, May 19, 2000
This update resolves the "IP Fragment Reassembly" security vulnerability in Windows 2000. Installing this update will minimize the negative effects that fragmented Internet Protocol (IP) datagrams could have on your computer's central processing unit (CPU). IP datagrams are a necessary part of network and Internet communication. If a continuous stream of fragmented IP datagrams with a particular malformation were sent to an affected computer, it could be made to devote most or all of its CPU availability to processing these fragments. The vulnerability would not allow a malicious user to compromise data on the computer or usurp administrative control over it. *Included in SP1

Security Update, April 18, 2000
This update eliminates the "Myriad Escaped Characters" security vulnerability found in Microsoft Internet Information Server (IIS). Installing this update will prevent a malicious user from adversely affecting a Web server's response time. The update also eliminates a vulnerability that could reveal certain information about the Web server to unauthorized users. *Included in SP1

Security Update, April 17, 2000
This update eliminates the "Malformed TCP/IP Print Request" vulnerability found in the TCP/IP Printing Services for Windows NT 4.0 and Windows 2000 (in Windows 2000, the service is referred to as "Print Services for Unix"). This is an optional service used primarily in mixed Windows NT-Unix environments, and is not installed by default. Installing this update will prevent a malicious user from disrupting printing services on a network that has installed TCP/IP Printing Services. The native Windows NT and Windows 2000 printing service is not affected by this vulnerability. *Included in SP1

Security Update, April 14, 2000
This update eliminates the "Virtualized UNC Share" security vulnerability found in Microsoft Internet Information Server (IIS) and some of its related software. Installing this update will prevent the source code of certain types of files to be sent from a Web server to a visiting user's browser. The vulnerability does not enable unauthorized users to change files or take administrative action on the Web server. *Included in SP1

Critical Update, March 21, 2000
Windows 2000 Encryption Protection Update. Microsoft has discovered an issue regarding 128-bit versions of Internet Explorer 5.0 customized by the Internet Explorer Administration Kit (IEAK) 5.0. After installing customized Internet Explorer 5.0, users of Windows 2000 will be unable to login. Microsoft has already prepared a protective update to download. Please review your specific situation to determine if you require protection from the scenario described in the Read Me First page. Please accept our apology for any inconvenience resulting from this issue. *Included in SP1

Windows 2000 Critical Update, February 17, 2000
Bring your computer up-to-date with the latest updates for the Windows 2000 operating system.  *Included in SP1

  • "Year is Reported Incorrectly on a Non-Gregorian Calendar."
    This update resolves a VBScripting problem where the year is reported incorrectly when using the Wareki or Taiwan date calendar. This problem does not occur if using the Gregorian calendar. This is not a Year 2000 problem, as it affects all dates. For more information on this issue, please visit Microsoft Knowledge Base (KB) Article Q253342.
  • "Corrupt Files Generated When Saving as .htm To HTTP Server From Word."
    This update resolves a potential data-corruption problem that can occur when saving files as .htm to an http server from Office 2000 programs, including Word and Excel. For more information on this issue, please visit Microsoft KB Article Q252633.
  • "Malformed Hit-Highlighting Argument Security Vulnerability."
    This update resolves a vulnerability that could allow a malicious Web surfer to gain unauthorized access to view files if running Web services and file indexing services. For more information on this vulnerability, please visit Microsoft Security Bulletin MS00-006.

Security Update for Microsoft Virtual Machine (VM)
Download the latest update for the Microsoft VM. Installing this update will resolve the "VM File Reading" security vulnerability in the current Microsoft VM and will upgrade you to the most recent version available.
*Included in SP1


These different patch information, downloads and links were obtained from the Microsoft Windows 2000 website at http://www.microsoft.com/windows2000 and are linked from ActiveWin.com for your convenience. For the most accurate information please visit the official site. 


Return To The Windows 2000 Section

 

  *  
  *   *