Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

MS11-051: Vulnerability in Active Directory Certificate Services Web Enrollment could allow elevation of privilege: June 14, 2011


View products that this article applies to.

INTRODUCTION

Microsoft has released security bulletin MS11-051. To view the complete security bulletin, visit one of the following Microsoft websites:

How to obtain help and support for this security update


Help installing updates:
Support for Microsoft Update

Security solutions for IT professionals:
TechNet Security Troubleshooting and Support

Help protect your computer that is running Windows from viruses and malware:
Virus Solution and Security Center

Local support according to your country:
International Support

↑ Back to the top


More Information

Known issues with this security update



After you install this security update, you may experience the following issues:


  • The Double-Byte Character Set (DBCS) characters of the certificate name are not displayed correctly on the "View the Status of a Pending Certificate Request" webpage on the enrollment site for a certification authority (CA).

    To resolve this problem:
    • In Windows 2008R2 install the hotfix 2637070 . For more information, click the following article number to view the article in the Microsoft Knowledge Base:
      2637070
      The DBCS characters of a certificate name are not displayed correctly if KB 2518295 is installed in Windows Server 2008 R2
    • In Win2003 and Win2008 platforms, you must edit the certckpn.asp file. The certckpn.asp file is located in the following folder:
      %systemroot%\System32\certsrv\<language specific folder>\
      • Change the following:
        sFieldFriendlyType = Server.HTMLEncode(Replace(Replace(rgRequests(nIndex)(FIELD_FRIENDLYTYPE),"\","\\"),"'","\'"))
        To the following:
        sFieldFriendlyType = Replace(Replace(rgRequests(nIndex)(FIELD_FRIENDLYTYPE),"\","\\"),"'","\'")
      • Change the following:
        <%=Server.HTMLEncode(rgRequests(nIndex)(FIELD_FRIENDLYTYPE))%></Span>
        To the following:
        <%=rgRequests(nIndex)(FIELD_FRIENDLYTYPE)%></Span>
      • Change the following:
        <%=Server.HTMLEncode(rgRequests(nIndex)(FIELD_FRIENDLYTYPE))%></A>
        To the following:
        <%=rgRequests(nIndex)(FIELD_FRIENDLYTYPE)%></A>
  • When you try to request a certificate, you may receive an error message that resembles the following:




    An error occurred on the server when processing the URL. Please contact the system Administrator.


    The problem occurs after you submit the request by using Web Enrollment ASP pages when the following is true:

    • "CA Certificate Manager Approval" is set in the template.
    • The Enable Buffering value is set to False in IIS.
    • The Web Enrollment role is enabled.




    To resolve this problem, you must edit the certrspn.asp file. The certrspn.asp is located in the following folder:



    %systemroot%\System32\certsrv\<language specific folder>\
    Make the following changes by using a text editor, and then save the certrspn.asp file:


    • Change the following:
      <!-- Windows Security Update, KB2518295 has replaced some of the CA Web Enrollment ASP files -->
      To the following:
      <%’ Windows Security Update, KB2518295 has replaced some of the CA Web Enrollment ASP files %>
    • Change the following:
      <!-- Please see http://www.support.microsoft.com/kb/2518295 for the back-up location of the previous ASP files -->
      To the following:
      <%’ Please see http://www.support.microsoft.com/kb/2518295 for the back-up location of the previous ASP files %>
  • A known issue exists for customers who have custom web enrollment ASP pages. When a certification authority (CA) role is enabled on Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2, sample web enrollment ASP pages are put in the Certificate Server folder (under %windir%\system32\Certsrv). Customers may have edited these pages to customize them to their needs.

    The security update described in MS11-051 fixes a cross-site scripting vulnerability in these pages. When the security update is installed, secure pages will replace the existing ASP pages.

    In order to avoid the potential for loss of data, Microsoft advises customers to back-up their customized ASP pages before installing the security update. After you install the security update, customers should merge their customizations into the secure ASP pages.

    Warning: If you unintentionally remove the fix to the vulnerability, you may become vulnerable to cross-site scripting attacks. Microsoft cannot guarantee the security of your system after you change these pages.

    For customers who did not back-up their customized pages before they applied the security update installation, the original pages are backed-up automatically by the Windows Update installation software. The back-up locations vary for each platform, architecture and service pack level. Please see the following table for the exact location.

    Warning: If you incorrectly change or remove files within any of these directories, you may cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that you can solve problems that result from changing or deleting files that are contained within these areas of the operating system.







    ProductLocation where customized web enrollment pages are backed-up
    Windows Server 2008 R2%windir%/winsxs/arch_microsoft-windows-webenroll.resources_31bf3856ad364e35_version_language SKU_hash

    Where,
    • arch is ‘x86’ if architecture is x86, else ‘amd64’.
    • version is ‘6.1.7600.16385’ for the release edition of Windows Server 2008 R2 and is ‘6.1.7601.17514’ for Windows Server 2008 R2 SP1.
    • language SKU varies from language to language. For example, it is ‘en-us’ for English, ‘de-de’ for German and ‘ja-jp’ for Japanese.
    • hash is the 48-bit hash that varies per platform, architecture, service pack and language.
    Windows Server 2008%windir%/winsxs/arch_microsoft-windows-webenroll.resources_31bf3856ad364e35_version_language SKU_hash

    Where,
    • arch is ‘x86’ if architecture is x86, else ‘amd64’.
    • version is ‘6.0.6001.18000’ if SP1 is installed and ‘6.0.6002.18005’ if SP2 is installed.
    • language SKU varies from language to language. For example, it is ‘en-us’ for English, ‘de-de’ for German and ‘ja-jp’ for Japanese.
    • hash is the 48-bit hash that varies per platform, architecture, service pack and language.
    Windows Server 2003Hidden folder %windir%/$NtUninstallKB2518295$
    Windows Server 2000Hidden folder %windir%/$NtUninstallKB2518295$
    Windows NT4 ServerHidden folder %windir%/$NtUninstallKB2518295$

↑ Back to the top


FILE INFORMATION


For a list of files that are provided within these packages, click the following link:


↑ Back to the top


Keywords: kb, atdownload, kbbug, kbexpertiseinter, kbfix, kblangall, kbmustloc, kbsecbulletin, kbsecreview, kbsecurity, kbsecvulnerability, kbsurveynew

↑ Back to the top

Article Info
Article ID : 2518295
Revision : 1
Created on : 1/7/2017
Published on : 5/11/2012
Exists online : False
Views : 914