Windows NT Multiple UNC Provider Vulnerability Patch

This update resolves the 'Unchecked buffer in the Multiple UNC Provider' security vulnerability in Windows NT 4.0 and is discussed in Microsoft Security Bulletin MS02-017. Download it now to prevent a malicious user from exploiting a buffer overflow vulnerability to either cause your computer to restart or to run unauthorized programs on your computer. The vulnerability results because of a flaw in the Multiple UNC (uniform naming convention) Provider (MUP), which is a network file system resource locator that runs in kernel-mode memory in Windows. Due to an unchecked buffer (a temporary storage area of limited capacity), a malicious user can send a specially malformed request and either cause the computer to restart or run programs as if he or she were the user.
File Size144.65 kB
Operating System Windows Windows NT
System RequirementsWindows NT


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
See All
See All