SUMMARY
Microsoft has released a cumulative patch for Internet
Explorer that includes updates for the issues that are described in the
following Microsoft Knowledge Base articles:
321232 MS02-023: May 15, 2002, Cumulative Patch for Internet Explorer
316059 MS02-005: February 11, 2002, Cumulative Patch for Internet Explorer
319182 MS02-015: March 28, 2002, Cumulative Patch for Internet Explorer
This cumulative patch also prevents the following
security vulnerabilities:
- A buffer overrun vulnerability that affects the Gopher
protocol handler. This vulnerability was originally described in the following
Microsoft Security Bulletin: This bulletin includes workaround instructions for use while this
cumulative patch was being completed.
- A buffer overrun vulnerability that affects an ActiveX
control that is used to display specially formatted text. The control contains
a buffer overrun vulnerability that can make it possible for an attacker to run
code on a user's computer in the context of the user.
- A vulnerability that involves how Internet Explorer handles
an HTML directive that displays XML data. The directive is designed to only
allow XML data from the Web site itself to be displayed. However, it does not
correctly look for the case where a referenced XML data source is in fact
redirected to a data source in a different domain. This flaw may make it
possible for an attacker's Web page to open an XML-based file that resides on a
remote computer in a browser window that the site can read. An attacker can
then read contents from Web sites to which users had access but the attacker
cannot view.
- A vulnerability that involves how Internet Explorer
represents the origin of a file in the File Download dialog box. This flaw can make it possible for an attacker to
misrepresent the source of a file that is offered for download in an attempt to
trick users into accepting a file download from an untrusted source and
believing it to be coming from a trusted source.
- A newly discovered variant of the "Frame Domain
Verification" vulnerability that is described in the following Microsoft
Security Bulletin: This variant occurs because of improper domain checking when
frames are invoked in conjunction with the Object tag. Because of this behavior, this vulnerability can make it
possible for a malicious Web site operator to open two browser windows, one in
the Web site's domain and the other on the user's local file. They can then
pass system information from the latter to the former. This makes it possible
for the Web site operator to read, but not change, any file on the user's local
computer that can be opened in a browser window. Additionally, this particular
variant can also make it possible for an attacker to start, but not pass
parameters to, an executable file (.exe) on the local computer. This is much
like the "Local Executable Invocation via Object tag" vulnerability that is
described in the following Microsoft Security Bulletin:
- A newly reported variant of the "Cross-Site Scripting in
Local HTML Resource" vulnerability that was originally described in the
following Microsoft Security Bulletin: Like the original variant, this vulnerability makes it possible
for an attacker to create a Web page that, when opened, would run in the Local
Computer zone. This means that it can run with fewer restrictions than it would
in the Internet zone.
In addition, the patch that is described in this article sets
the "Kill Bit" on the MSN Chat ActiveX control that is described in Microsoft
Security Bulletin
MS02-022
as well as the TSAC ActiveX control that is described in Microsoft Security
Bulletin
MS02-046.This
has been done to make sure that vulnerable controls cannot be introduced onto
users' systems. Microsoft recommends that customers who use the MSN Chat
control make sure that they have applied the updated version of the control
discussed in MS02-022:
Microsoft recommends that customers who use the TSAC control make
sure that they have applied the updated version of the control discussed in
MS02-046:
For additional information about
using the "kill bit" to stop an ActiveX control from running in Internet
Explorer, click the following article number to view the article in the
Microsoft Knowledge Base:
240797
How to Stop an ActiveX Control from Running in Internet Explorer
For additional information about known issues that can occur
when you install this update, click the article number below to view the
article in the Microsoft Knowledge Base:
325192 Issues After You Install Updates to Internet Explorer or Windows
For additional information about the latest service pack for Microsoft Windows 2000, click the following article number to view the article in the Microsoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
MORE INFORMATION
For more information about this patch, visit the following
Microsoft Web site:
Download Information
The following
file is available for download from the Microsoft Download
Center:
Release Date: August
22, 2002
For additional information about how to download Microsoft
Support files, click the following article number to view the article in the
Microsoft Knowledge Base:
119591 How to Obtain Microsoft Support Files from Online Services
Microsoft scanned this file for viruses. Microsoft used the most
current virus-detection software that was available on the date that the file
was posted. The file is stored on security-enhanced servers that help to
prevent any unauthorized changes to the file.
The Internet Explorer 5.01 version of this update is for
Windows 2000 only and is also available in Windows 2000 Service Pack 3 (SP3).
For additional information, click the article
number below to view the article in the Microsoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
Installation Information
The Internet Explorer 5.5 version of this update requires
Internet Explorer 5.5 Service Pack 2 (SP2) or Service Pack 1 (SP1).
For additional information, click the
article number below to view the article in the Microsoft Knowledge Base:
276369 How to Obtain the Latest Service Pack for Internet Explorer 5.5
The Internet Explorer 5.01 version of this update
is for Windows 2000 only and requires Windows 2000 Service Pack 2 (SP2).
For additional information, click the article
number below to view the article in the Microsoft Knowledge Base:
260910 How to Obtain the Latest Windows 2000 Service Pack
You must restart your computer after you apply this
update. This package supports the following switches:
- /q Specifies quiet mode, or suppresses prompts, when files are being
extracted.
- /q:u Specifies user-quiet mode, which presents some dialog boxes to
the user.
- /q:a Specifies administrator-quiet mode, which does not present any
dialog boxes to the user.
- /t:<path> Specifies the target folder for extracting files.
- /c Extracts the files without installing them.
- /c:<path> Specifies the path and name of the Setup .inf or .exe file.
- /r:n Never restarts the computer after installation.
- /r:i Restart if a restart is required - Automatically restarts the
computer if it is required to complete installation.
- /r:a Always restarts the computer after installation.
- /r:s Restarts the computer after installation without prompting the
user.
- /n:v No version checking - Install the program over any previous
version.
For example, the
file
name /q:a /r:n command installs the update without
any user intervention, and then it does not force the computer to
restart.
WARNING: Your computer is vulnerable until you restart it and log on as an
administrator to complete the installation.
NOTE: You cannot successfully install this update on Windows XP-based
computers in non-interactive mode (for example, by using Windows Task
Scheduler, Microsoft Systems Management Server, or Tivoli software from from
IBM).
Microsoft is
researching this problem and will post more information in this article when
the information becomes available.
File Information
The English version of this fix has the file attributes (or
later) that are listed in the following table. The dates and times for these
files are listed in coordinated universal time (UTC). When you view the file
information, it is converted to local time. To find the difference between UTC
and local time, use the
Time Zone tab in the Date and Time tool in Control Panel.
The
following files are installed to the %WINDIR%\System32 folder:
Date Time Version Size File name Internet
Explorer
Version
----------------------------------------------------------------------
23-Jul-2002 15:49 6.0.2719.2200 2,759,680 Mshtml.dll 6
05-Mar-2002 03:09 6.0.2715.400 548,864 Shdoclc.dll 6
23-Jul-2002 15:51 6.0.2719.2200 1,336,320 Shdocvw.dll 6
23-Jul-2002 15:57 6.0.2715.400 109,568 Url.dll 6
23-Jul-2002 15:51 6.0.2719.2200 480,768 Urlmon.dll 6
06-Jun-2000 23:43 4.71.704.0 2,272 W95inf16.dll 6
06-Jun-2000 23:43 4.71.16.0 4,608 W95inf32.dll 6
06-Jun-2002 20:38 6.0.2718.400 583,168 Wininet.dll 6
06-Jun-2000 20:43 5.50.4134.600 92,432 Advpack.dll 5.5 SP2
22-Jul-2002 20:59 5.50.4919.2200 2,755,856 Mshtml.dll 5.5 SP2
22-Jul-2002 21:00 5.50.4919.2200 1,149,200 Shdocvw.dll 5.5 SP2
05-Mar-2002 01:53 5.50.4915.500 84,240 Url.dll 5.5 SP2
22-Jul-2002 21:01 5.50.4919.2200 451,344 Urlmon.dll 5.5 SP2
06-Jun-2000 20:43 4.71.704.0 2,272 W95inf16.dll 5.5 SP2
06-Jun-2000 20:43 4.71.16.0 4,608 W95inf32.dll 5.5 SP2
06-Jun-2002 21:27 5.50.4918.600 481,552 Wininet.dll 5.5 SP2
18-Dec-2001 15:48 5.50.4724.1700 79,120 Actxprxy.dll 5.5 SP1
06-Jun-2000 20:43 5.50.4134.600 92,432 Advpack.dll 5.5 SP1
18-Dec-2001 01:45 5.50.4724.1700 46,864 Digest.dll 5.5 SP1
22-Jul-2002 19:41 5.50.4731.2200 2,754,320 Mshtml.dll 5.5 SP1
18-Dec-2001 01:42 5.50.4724.1700 408,336 Mshtmled.dll 5.5 SP1
18-Dec-2001 01:43 5.50.4724.1700 71,952 Plugin.ocx 5.5 SP1
18-Dec-2001 15:48 5.50.4724.1700 494,352 Shdoc401.dll 5.5 SP1
24-Jul-2002 15:30 5.50.4731.2200 1,148,688 Shdocvw.dll 5.5 SP1
18-Dec-2001 14:52 5.50.4724.1700 23,312 Shfolder.dll 5.5 SP1
05-Mar-2002 01:53 5.50.4915.500 84,240 Url.dll 5.5 SP1
22-Jul-2002 19:43 5.50.4731.2200 450,832 Urlmon.dll 5.5 SP1
06-Jun-2000 20:43 4.71.704.0 2,272 W95inf16.dll 5.5 SP1
06-Jun-2000 20:43 4.71.16.0 4,608 W95inf32.dll 5.5 SP1
11-Jun-2002 19:33 5.50.4730.700 482,064 Wininet.dll 5.5 SP1
06-Jun-2000 20:43 5.50.4134.600 92,432 Advpack.dll 5.01 SP2
09-Sep-2001 22:31 11,264 Instcat.exe 5.01 SP2
23-Jul-2002 14:53 5.0.3504.2500 2,355,472 Mshtml.dll 5.01 SP2
23-Jul-2002 14:54 5.0.3504.2500 1,106,192 Shdocvw.dll 5.01 SP2
05-Mar-2002 01:53 5.50.4915.500 84,240 Url.dll 5.01 SP2
23-Jul-2002 14:55 5.0.3504.2500 451,344 Urlmon.dll 5.01 SP2
06-Jun-2000 20:43 4.71.704.0 2,272 W95inf16.dll 5.01 SP2
06-Jun-2000 20:43 4.71.16.0 4,608 W95inf32.dll 5.01 SP2
07-Jun-2002 23:56 5.0.3506.1000 461,584 Wininet.dll 5.01 SP2
NOTE: Due to file dependencies, this update may contain additional
files.