SNAPMP Memory Leak After Host-Initiated Password Change (193829)
The information in this article applies to:
- Microsoft SNA Server 3.0
- Microsoft SNA Server 3.0 SP1
- Microsoft SNA Server 3.0 SP2
- Microsoft SNA Server 3.0 SP3
- Microsoft SNA Server 4.0
- Microsoft SNA Server 4.0 SP1
This article was previously published under Q193829 SYMPTOMS
After a password change is received and processed, a memory leak of 150
bytes per password change is observed.
CAUSE
The Windows NT Account Synchronization service is responsible for
synchronizing passwords between a host and a Windows NT domain.
SNAHOSTPROCESS and SNAPMP work together to synchronize host-initiated
password changes. SNAHOSTPROCESS is controlled by the Host Account
Synchronization service. SNAHOSTPROCESS sends host-initiated password
changes to SNAPMP via encrypted RPC. SNAPMP is not releasing the memory
allocated for RPC responses during this process.
RESOLUTIONSNA Server version 3.0
A supported fix that corrects this problem is now available from Microsoft,
but has not been fully regression-tested and should be applied only to
systems experiencing this specific problem. To resolve this problem,
contact Microsoft Product Support Services to obtain the fix. For a
complete list of Microsoft Product Support Services phone numbers and
information on support costs, please go to the following address on the
World Wide Web:
The English version of this fix should have the following file attributes
or later:
File Name Date Time
------------------------------
Snapmp.exe 09/15/98 11:42
Hostproc.exe 09/15/98 11:42
NOTE: Due to file dependencies, the most recent fix that contains the above
files may also contain additional files.
SNA Server version 4.0
This problem was corrected in the latest SNA Server version 4.0 U.S.
Service Pack. For information on obtaining this Service Pack, query on
the following word in the Microsoft Knowledge Base (without the spaces):
Modification Type: | Major | Last Reviewed: | 6/24/2004 |
---|
Keywords: | kbbug kbfix KB193829 |
---|
|