Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

When you try to connect to a DNS server by using the DNS snap-in (Dnsmgmt.msc) on a Windows Server 2003-based computer, the connection fails


View products that this article applies to.

Symptoms

When you try to connect to a Domain Name System (DNS) server by using the DNS snap-in (Dnsmgmt.msc) on a Microsoft Windows Server 2003-based computer, the connection fails. In the console tree, you see a red "X" next to the DNS server connection node. This problem occurs if the following conditions are true:
  • The DNS remote procedure call (RPC) interface is configured to use only local procedure calls.
  • You connect to the DNS server by using a NetBIOS name.
  • The DNS server has a computer name of 15 characters.
Note This problem also occurs when you use other DNS management tools that are based on DNS RPC. For example, this problem also occurs when you use the Dnscmd.exe tool.

↑ Back to the top


Cause

This problem occurs because the DNS management tool incorrectly allocates a buffer.

↑ Back to the top


Resolution

Hotfix information

A supported hotfix is available from Microsoft. However, this hotfix is intended to correct only the problem that is described in this article. Apply this hotfix only to systems that are experiencing this specific problem. This hotfix might receive additional testing. Therefore, if you are not severely affected by this problem, we recommend that you wait for the next software update that contains this hotfix.

If the hotfix is available for download, there is a "Hotfix download available" section at the top of this Knowledge Base article. If this section does not appear, contact Microsoft Customer Service and Support to obtain the hotfix.

Note If additional issues occur or if any troubleshooting is required, you might have to create a separate service request. The usual support costs will apply to additional support questions and issues that do not qualify for this specific hotfix. For a complete list of Microsoft Customer Service and Support telephone numbers or to create a separate service request, visit the following Microsoft Web site: Note The "Hotfix download available" form displays the languages for which the hotfix is available. If you do not see your language, it is because a hotfix is not available for that language.

Prerequisites

To apply this hotfix, you must have Windows Server 2003 Service Pack 1 (SP1) or Windows Server 2003 Service Pack 2 (SP2) installed on the computer. For more information, click the following article number to view the article in the Microsoft Knowledge Base:
889100� How to obtain the latest service pack for Windows Server 2003

Restart requirement

You do not have to restart the computer after you apply this hotfix.

Hotfix replacement information

This hotfix does not replace any other hotfixes.

File information

The English version of this hotfix has the file attributes (or later file attributes) that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). When you view the file information, it is converted to local time. To find the difference between UTC and local time, use the Time Zone tab in the Date and Time item in Control Panel.
Windows Server 2003 with SP1, x86-based versions
Collapse this tableExpand this table
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Dnsmgr.dll5.2.3790.2925873,47226-Apr-200721:58x86SP1SP1QFE
Windows Server 2003 with SP2, x86-based versions
Collapse this tableExpand this table
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Dnsmgr.dll5.2.3790.4069873,47226-Apr-200722:32x86SP2SP2QFE
Windows Server 2003 with SP1, Itanium-based versions
Collapse this tableExpand this table
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Dnsmgr.dll5.2.3790.29252,027,00826-Apr-200708:11IA-64SP1SP1QFE
Wdnsmgr.dll5.2.3790.2925873,47226-Apr-200708:11x86SP1WOW
Windows Server 2003 with SP2, Itanium-based versions
Collapse this tableExpand this table
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Dnsmgr.dll5.2.3790.40692,027,00826-Apr-200708:26IA-64SP2SP2QFE
Wdnsmgr.dll5.2.3790.4069873,47226-Apr-200708:26x86SP2WOW
Windows Server 2003, x64-based versions
Collapse this tableExpand this table
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Dnsmgr.dll5.2.3790.29251,311,74426-Apr-200708:10x64SP1SP1QFE
Wdnsmgr.dll5.2.3790.2925873,47226-Apr-200708:10x86SP1WOW
Windows Server 2003 with SP2, x64-based versions
Collapse this tableExpand this table
File nameFile versionFile sizeDateTimePlatformSP requirementService branch
Dnsmgr.dll5.2.3790.40691,311,74426-Apr-200708:24x64SP2SP2QFE
Wdnsmgr.dll5.2.3790.4069873,47226-Apr-200708:24x86SP2WOW

↑ Back to the top


Workaround

To work around this problem, follow these steps:
  1. Click Start, click Run, type dnsmgmt.msc, and then click OK.
  2. Right-click the problematic DNS server connection node, and then click Delete.
  3. Click Yes to confirm the deletion.
  4. Right-click DNS, and then click Connect to DNS Server.
  5. Click The following computer, enter one of the following items, and then click OK:
    • A dot (.)
    • The fully qualified domain name (FQDN) of the DNS server
    • 127.0.0.1
    Note We recommend that you type a dot or the FQDN. "127.0.0.1" may not work in some cases.
Note After you follow these steps, the problem is resolved only for the administrator who is currently logged on to the computer.

↑ Back to the top


Status

Microsoft has confirmed that this is a problem in the Microsoft products that are listed in the "Applies to" section.

↑ Back to the top


More information

As an example, you would configure DNS RPC to use only local procedure calls after you have followed Microsoft Security Advisory 935964. This security advisory discusses how to remove a vulnerability in RPC. For more information about Microsoft Security Advisory 935964, visit the following Microsoft TechNet Web site: For more information, click the following article number to view the article in the Microsoft Knowledge Base:
824684� Description of the standard terminology that is used to describe Microsoft software updates

↑ Back to the top


Keywords: kbautohotfix, kbexpertiseinter, kbwinserv2003postsp2fix, kbbug, kbfix, kbHotfixServer, kbqfe, KB936243

↑ Back to the top

Article Info
Article ID : 936243
Revision : 2
Created on : 10/8/2011
Published on : 10/8/2011
Exists online : False
Views : 301