Article ID: 231605 - View products that this article applies to.
This article was previously published under Q231605
This article has been archived. It is offered "as is" and will no longer be updated.
A specially-malformed Microsoft Help file may be used to exploit a security vulnerability on a Windows NT-based computer. When a user activates the Windows Help file tool (for example, by pressing the F1 key) this vulnerability may be used to run a program and may cause the Help file tool to stop responding (hang).
The Help tool parses and displays Help information for programs. The Help information is contained in several file types that are generated by the Microsoft Help Compiler program and are stored (by default) in the %SystemRoot%\Help folder. Users have both Read and Write permissions to this folder by default. An unchecked buffer exists in the Help utility, and a Help file that has been carefully modified could be used to run a program on the local computer using a buffer overrun technique. Because the Help Compiler program's output files do not generate the specific malformation at issue here, this vulnerability could not be accidentally exploited.
Windows NT Server or Workstation 4.0To resolve this problem, obtain the latest service pack for Windows NT 4.0 or the individual software update. For information on obtaining the latest service pack, please go to:
http://support.microsoft.com/default.aspx?scid=fh;EN-US;CNTACTMSNOTE: This hotfix can be applied to computers running Windows NT 4.0 Service Pack 4 or Windows NT 4.0 Service Pack 5.
Windows NT Server 4.0, Terminal Server EditionTo resolve this problem, obtain the latest service pack for Windows NT Server 4.0, Terminal Server Edition. For additional information, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/152734/EN-US/ )How to Obtain the Latest Windows NT 4.0 Service Pack
Microsoft has confirmed that this is a problem in the Microsoft products that are listed at the beginning of this article. This problem was first corrected in Windows NT Server version 4.0, Terminal Server Edition Service Pack 6.
Computers primarily at risk from this vulnerability are workstations, terminal servers, and other computers that allow users to log on interactively and add or modify Help files. Servers generally do not allow normal users to interactively log on. Note that this vulnerability would affect only the local computer; there is no capability to directly attack a remote computer by means of this vulnerability.
For related information on this problem, please visit the Web site at:
http://www.microsoft.com/technet/security/bulletin/ms99-015.mspxFor additional security-related information about Microsoft products, please visit the Web site at:
Article ID: 231605 - Last Review: November 2, 2013 - Revision: 5.0