Article ID: 896054 - View products that this article applies to.
After you install security update 896358, security update 840315, or Microsoft Windows Server 2003 Service Pack 1 (SP1), you may experience the following symptoms:
(http://support.microsoft.com/kb/896358/ )MS05-026: A vulnerability in HTML Help could allow remote code execution
(http://support.microsoft.com/kb/840315/ )MS04-023: Vulnerability in HTML Help could allow code execution
Windows Server 2003 SP1 and security updates 896358 and 840315 include changes to the InfoTech protocol. These changes were introduced to reduce security vulnerabilities in HTML Help.
Warning The symptoms are an expected and intended effect of installing the security updates. This section provides workarounds to re-enable features of business-critical programs. The workarounds may make the computer more vulnerable to the threats that the security updates address. The safest course is not to use the registry workarounds. If you must use workarounds, set the registry values to be as restrictive as possible.
Important This section, method, or task contains steps that tell you how to modify the registry. However, serious problems might occur if you modify the registry incorrectly. Therefore, make sure that you follow these steps carefully. For added protection, back up the registry before you modify it. Then, you can restore the registry if a problem occurs. For more information about how to back up and restore the registry, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/322756/ )How to back up and restore the registry in Windows
The first of the following examples is the most restrictive example. The next examples are successively less restrictive.
Example 1: How to use UrlAllowList to enable specific URLsWarning Include only URLs to sites that you trust completely.
The following .reg file re-enables use of the InfoTech protocol to open remote content from the following locations:
Note As you can see from the example, to enable a UNC path to a network shared folder, you must add the following two entries:
\\productmanuals\helpfiles\;file://\\productmanuals\helpfilesYou cannot use wildcard characters in the URL string of any site that is added to the UrlAllowList registry key. For example, the following string does not work:
"UrlAllowList"="http://*.wingtiptoys.com"However, the following string works:
"UrlAllowList"="http://help.wingtiptoys.com"This string lets the following sites serve content by using the InfoTech protocol:
Example 2: How to use the MaxAllowedZone value to enable a security zoneWarning The MaxAllowedZone value enables all sites in a specific zone. Using UrlAllowList as described in example 1 may be safer. If you must use the MaxAllowedZone value, set it no higher than you must. If you set the value to 3 or higher, you expose your systems to attack from the Internet.
Note By default, the MaxAllowedZone value is set to zero. The following table summarizes how different entries are interpreted by the MaxAllowedZone value.
The following .reg file re-enables use of the InfoTech protocol to connect to all systems in the Intranet zone.
Collapse this tableExpand this table
Example 3: How to use both UrlAllowList and the MaxAllowedZone valueWarning The MaxAllowedZone value enables all sites in a specific zone. Using UrlAllowList as described ini example 1 may be safer. If you must use the MaxAllowedZone value, set it no higher than you must. If you set the value to 3 or higher, you expose your systems to attack from the Internet.
The following .reg file re-enables use of the InfoTech protocol to connect to all content in the Intranet zone and to two Internet sites.
Example 4: Use NestedProtocolList to enable nested protocols within a URLCertain Web applications may use nested protocols within a URL. This feature was removed from HTML Help with security update 840315. After you install this security update, Web applications that use nested protocols within a URL may not work correctly.
For example, the following URL may not work:
After you install security update 896358, the following .reg file re-enables the HTTP and FTP protocols to be nested in a URL.
Note You can paste the following text in a text editor such as Notepad. Then, you can save the file that uses the .reg file name extension.
How to deploy the registry keys across a domainWe recommend that you deploy the settings in the previously mentioned examples as startup scripts by using Group Policy. You can also deploy these settings as logon scripts. However, this method is less desirable because of permission constraints.
The following steps are an example of how to deploy the settings in "Example 1" as a Group Policy startup script.
Overview and examples for system administratorsFor more information about security update 896358 and how you can re-enable Web applications that are affected by this update, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/896358/ )MS05-026: Vulnerability in HTML Help could allow remote code execution
Internet Explorer Enhanced SecurityIf Internet Explorer Enhanced Security is enabled, you may experience symptoms that are similar to those described in this article. In this case, the workarounds in this article may not be sufficient to resolve the symptoms. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/815141/ )Internet Explorer Enhanced Security configuration changes the browsing experience
More information about the InfoTech protocolThe InfoTech protocol is primarily used by HTML Help. The functionality of this protocol is provided by the Itss.dll file. You can access this protocol by using one of the following supported schemes:
Internet Explorer security zonesFor more information about how to use security zones in Internet Explorer, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/174360/ )How to use security zones in Internet Explorer
Group PolicyFor more information about Group Policy, visit the following Microsoft Web sites:
Technical support for x64-based versions of Microsoft WindowsOn computers that are running x64-based versions of Microsoft Windows, you may have to adapt the instructions in the "Resolution" section about how to modify the registry. For example, you might have to modify a different part of the registry, depending on whether you want to modify the 32-bit or the 64-bit functionality. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
896459Your hardware manufacturer provides technical support and assistance for x64-based versions of Windows. Your hardware manufacturer provides support because an x64-based version of Windows was included with your hardware. Your hardware manufacturer might have customized the installation of Windows with unique components. Unique components might include specific device drivers or might include optional settings to maximize the performance of the hardware. Microsoft will provide reasonable-effort assistance if you need technical help with your x64-based version of Windows. However, you might have to contact your manufacturer directly. Your manufacturer is best qualified to support the software that your manufacturer installed on the hardware.
(http://support.microsoft.com/kb/896459/ )Registry changes in x64-based versions of Windows Server 2003 and Windows XP Professional x64 Edition
For product information about Microsoft Windows XP Professional x64 Edition, visit the following Microsoft Web site:
http://www.microsoft.com/windowsxp/64bit/default.mspxFor product information about x64-based versions of Microsoft Windows Server 2003, visit the following Microsoft Web site:
Article ID: 896054 - Last Review: October 11, 2007 - Revision: 7.9