Access Violation Occurs Because of a Stack Corruption in CSecurityAdmin2::CanonicalizeUserName and FormalizeUserName (318525)



The information in this article applies to:

  • Microsoft COM+ 1.0, when used with:
    • the operating system: Microsoft Windows 2000

This article was previously published under Q318525

SYMPTOMS

A stack corruption in the CSecurityAdmin2::CanonicalizeUserName and the FormalizeUserName methods may cause an access violation (c0000005) to occur.

RESOLUTION

To resolve this problem, obtain Microsoft COM+ Hotfix Rollup 19. For additional information, click the article number below to view the article in the Microsoft Knowledge Base:

318105 INFO: Availability of Windows 2000 Post-Service Pack 2 COM+ Hotfix Rollup Package 19

To resolve this problem, obtain the latest service pack for Windows 2000. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:

260910 How to Obtain the Latest Windows 2000 Service Pack


STATUS

Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows 2000 Service Pack 3.

MORE INFORMATION

The call stack appears as follows:

kd> kb                      [Local        12:35 PM]
ChildEBP RetAddr  Args to Child
0134eeb8 6fbe2e2e 6fbd3120 00680054 00200065 ntdll!_DbgUserBreakPoint
0134f2c4 6fbe54fe 0134f2f0 0134f808 7802414f catsrv!CCatalogServer::UnhandledExceptionFilter+0x56
0134f824 6fbb5d13 00175f28 01188350 01188360 catsrv!CCatalogServer::WriteTable+0x146
0134f9dc 77d23866 010d7c60 001641ec 00172a6c catsrvps!ICatalogTableWrite1_WriteTable_Stub+0x3b1
0134fa34 772a6796 010d7c60 00172a6c 001641ec RPCRT4!CStdStubBuffer_Invoke+0x3f
0134fa74 772a853e 00172a6c 0014d4a8 00126cec ole32!SyncStubInvoke+0x33
0134fabc 77223ef2 00172a6c 010d74e8 010d7c60 ole32!StubInvoke+0xa5
0134fb94 772145cf 001641ec 01094538 010d7c60 ole32!CCtxComChnl::ContextInvoke+0xdf
0134fbb0 772a75b8 00172a6c 00000001 010d7c60 ole32!MTAInvoke+0x18
0134fbe0 772a78f3 00172a20 001641ec 010d7c60 ole32!AppInvoke+0x8b
0134fca4 772a537d 01188350 00000000 00000000 ole32!ComInvokeWithLockAndIPID+0x27d
0134fce8 77cf4407 00172a20 00000000 000006bb ole32!ThreadInvoke+0x1d6
0134fd1c 77cd8fc1 772a51a7 010d9a24 0134fdfc RPCRT4!DispatchToStubInC+0x17
0134fd78 77cd9603 010d9a24 00000000 771b424c RPCRT4!RPC_INTERFACE::DispatchToStubWorker+0x132
0134fd9c 77cd9710 010d9a24 00000000 771b424c RPCRT4!RPC_INTERFACE::DispatchToStub+0x90
0134fdcc 77cd293e 010d9a24 010d99e0 00000000 RPCRT4!RPC_INTERFACE::DispatchToStubWithObject+0xb3
0134fe08 77cd4709 000af9a8 801a0002 0014c530 RPCRT4!LRPC_SCALL::DealWithRequestMessage+0x342
0134fe2c 77cd4d46 0008dd4c 0134fe48 000af9a8 RPCRT4!LRPC_ADDRESS::DealWithLRPCRequest+0x16b
0134ff90 77cd4f6b 77cd7b92 0008dd10 77ddf63f RPCRT4!LRPC_ADDRESS::ReceiveLotsaCalls+0x298
0134ff94 77cd7b92 0008dd10 77ddf63f fffffffe RPCRT4!RecvLotsaCallsWrapper+0x9
					

For additional information about how to obtain a hotfix for Windows 2000 Datacenter Server, click the article number below to view the article in the Microsoft Knowledge Base:

265173 The Datacenter Program and Windows 2000 Datacenter Server Product

For additional information about how to install multiple hotfixes with only one reboot, click the article number below to view the article in the Microsoft Knowledge Base:

296861 Use QChain.exe to Install Multiple Hotfixes with One Reboot


Modification Type:MajorLast Reviewed:6/5/2003
Keywords:kbbug kbfix kbWin2000PreSP3Fix kbWin2000sp3fix KB318525