Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Microsoft Security Advisory: Vulnerability in Internet Explorer could allow information disclosure


INTRODUCTION

Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site:


To have us fix this problem for you, go to the "Fix it for me" section. If you would rather fix this problem yourself, see the workaround section in the
security advisory.



↑ Back to the top


Fix it for me

This fixit solution described in this section is not intended to be a replacement for any security update. We recommend that you always install the latest security updates. However, we offer this fixit solution as a workaround option for some scenarios.



For more information about this workaround, visit the following Microsoft Security Advisory Web page:

The advisory provides more information about the issue, including the following:

  • The scenarios in which you might apply or disable the workaround.
  • How to manually apply the workaround.

Specifically, to see this information, look for the General Information heading, then expand the Suggested actions section, and then expand the Workaround section.

To automatically apply this resolution, click the Fix this problem link under the "Enable Network Protocol Lockdown" heading. Then, click Run in the File Download dialog box and follow the steps in the wizard. This applies the "enable network protocol lockdown" workaround that is listed in CVE-2010-0255.


To automatically undo the fix and restore the original settings, click the Fix this problem link under the "Disable Network Protocol Lockdown" heading. Then, click Run in the File Download dialog box and follow the steps in the wizard. This removes the "enable network protocol lockdown" workaround that is listed in CVE-2010-0255.

Microsoft has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they help block known attack vectors. For more information about the workarounds, see the security advisory.




Enable Network Protocol LockdownDisable Network Protocol Lockdown

Notes
  • This Fix it can be used with supported versions of Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2.
  • This wizard may be in English only. However, the automatic fix also works for other language versions of Windows.
  • If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem.
For more information about the Internet Explorer Network Protocol Lockdown functionality, visit the following Microsoft Web page:


↑ Back to the top


Keywords: kbsecreview, kbexpertiseinter, kbinfo, kbsecadvisory, kbsecurity, kbsecvulnerability, kblangall, kbmustloc, kbmsifixme, kbfixme, kbsurveynew, kb

↑ Back to the top

Article Info
Article ID : 980088
Revision : 1
Created on : 1/7/2017
Published on : 11/6/2019
Exists online : False
Views : 79