Patch Available for "Indexing Service File Enumeration" Vulnerability (280838)



The information in this article applies to:

  • Microsoft Windows 2000 Server SP1
  • Microsoft Windows 2000 Advanced Server SP1
  • Microsoft Windows 2000 Professional SP1

This article was previously published under Q280838

SYMPTOMS

Microsoft has released a patch that eliminates a security vulnerability in a component that is a part of Windows 2000. The vulnerability could allow a malicious Web site operator to learn the names and properties of files and folders on the computer of a visiting user.

An ActiveX control that is included as part of the Indexing Service is incorrectly marked as "safe for scripting." Because of this, the ActiveX control may be started by Web site programs. This control could be used to enumerate files and folders, and to view their properties. Note that it would not be necessary for the Indexing service to be running for the vulnerability to be exploited. However, if it were running, the control could also be used to search for files that contain specific words. The vulnerability could not be used to read files, except by using a scenario that is described in the following Microsoft Security Bulletin: The vulnerability could not be used to change, add, or delete information on your computer.

NOTE: A patch has been provided for the Indexing service version 3.0, but not for Index Server 2.0. This is primarily due to the different delivery methods that are used for these two products. Indexing service 3.0 is included as a part of all versions of Windows 2000, and because of this, the vulnerability could affect all Windows 2000 users. However, Index Server 2.0 is included as a part of the Windows NT 4.0 Option Pack. Because of this, to be affected by the vulnerability in Index Server 2.0, a Web master would need to browse untrusted Internet sites from his own Web server, and this is contrary to normal recommended practices.

Note that if you applied an earlier version of the fix that is described in this article, you may receive the following error message when you view ASP Web pages that use JavaScript:
16386 No such interface supported
The version of the fix that is described in this article resolves this problem.

RESOLUTION

To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

260910 How to Obtain the Latest Windows 2000 Service Pack

The following file is available for download from the Microsoft Download Center:
For additional information about how to download Microsoft Support files, click the following article number to view the article in the Microsoft Knowledge Base:

119591 How to Obtain Microsoft Support Files from Online Services

Microsoft scanned this file for viruses. Microsoft used the most current virus-detection software that was available on the date that the file was posted. The file is stored on security-enhanced servers that help to prevent any unauthorized changes to the file. The English version of this fix should have the following file attributes or later:
   Date       Time    Version        Size    File name
   -----------------------------------------------------
   8/7/2001   06:34p  5.0.2195.4088  49,936  Ixsso.dll
				

STATUS

Microsoft has confirmed that this problem may cause a degree of security vulnerability in Microsoft Windows 2000. This problem was first corrected in Windows 2000 Service Pack 3.

MORE INFORMATION

For additional information about how to install Windows 2000 and Windows 2000 hotfixes at the same time, click the article number below to view the article in the Microsoft Knowledge Base:

249149 Installing Microsoft Windows 2000 and Windows 2000 Hotfixes


Modification Type:MinorLast Reviewed:9/26/2005
Keywords:kbHotfixServer kbQFE kbbug kbfix kbgraphxlinkcritical kbWin2000PreSP2Fix kbWin2000sp3fix KB280838