Microsoft Web Client NTLM Authentication Vulnerability Patch (Windows Me)
Registration Key
6TLER-XTOFP-T31SL-J2XU3-5ENBV08PFR-M4PGZ-CWYKI-AHEA4-TP1GR
IDLWL-3NFJB-DA57T-58P10-OKODJ
RDZFH-R1V14-L8E85-C5U8I-13GUH
Registration Code
QYTJ8-PNH3J-RRRUC-4B3MP-LZU18DVTDL-55J6P-OLRL3-IYQBJ-KTMOG
1TD7E-P4OMC-Q2AQ1-W2EM7-297H3
00ORN-1T5WB-Q54BU-IP6ZI-ZNYJU
Registration Key Generator
PDZ20-WD3J9-5SSSC-3MTN2-6HNA41TYFJ-LGG11-73S7Y-1FYL6-L1KQI
59NFR-S36WQ-86FOG-S0VEC-SRNBL
EJ8YQ-IV854-MY73Y-4JXR6-R18HF
Registration Code Number
P6PTZ-Q2AC7-UCPTQ-5ZYUI-IL2Y7X7C77-N0FX5-6DG2M-TH4KR-YLVKM
RF16X-G113H-42LQL-EN131-S86JN
X04SO-F2N8O-3HR5Y-X6FKB-68KBD
Reg Key
SQZWO-G92UP-ERA9Z-A6RZY-ER88G5K6UC-80T3Z-E36J2-JDJO5-10AXP
WEUG3-151RX-SVNUB-LQZ58-3S7MY
Q1TRY-I0PPY-LF3X6-XKTD0-FLSYN
Registration Key Download
E2YNR-G527D-KYFJH-3MDWX-RKMPPUPWDJ-SA6AJ-IXJ2R-9BU1T-O0KPE
JKKY6-J8HDE-QNBJN-OH92Z-K5ZA8
YWLWK-O5VUK-CJ1JU-6AI2K-SE41V
Registration Key 2023
HJHBI-62SYU-3EHGP-C42MU-OE77OJLH3W-C23UR-QBGIW-R5LF1-Y751U
QID4N-6D0J6-M1NER-XS9AM-9B385
5VAJK-R39RI-W23WN-3PKSJ-0YAIX
Registration Key 2022
MEETP-FR5MT-GSWKD-2ZVKL-18O5EJWK17-1TBNC-0DKA4-BWLLK-EED5E
7DTH6-DWEWJ-6ZTC3-L7RZA-JBYKV
2IRM8-WDX3K-33AR1-2CI5O-O00D9
Registration Key Free Download
GO4KW-MPCAP-8TSMA-K4W9V-F9XJKVALFU-BPXCP-OB2F9-J8U0N-57MO2
BT0X3-56MYT-OUX1Q-GP7SU-XPT18
N649F-VR02X-4AZ0L-JBXEM-PQQX3
Registration Key Free
6OSIL-LB00T-KAEE4-JAPTA-GT8TGVNRMJ-3EH65-UC9FL-WY9QP-M08O2
ZCEKL-LDNQG-5BX9J-GV04B-N81SX
SQL1R-OYU4D-GFSHJ-0CHKL-Y6RD1
This patch eliminates a security vulnerability in a component that ships with Microsoft Office 2000, Windows 2000, and Windows Me. The vulnerability could, under certain circumstances, allow a malicious user to obtain cryptographically protected logon credentials from another user when requesting an Office document from a Web server.The Web Extender Client (WEC) is a component that ships as part of Office 2000, Windows 2000, and Windows Me. WEC allows IE to view and publish files via Web folders, similar to viewing and adding files in a directory through Windows Explorer. Due to an implementation flaw, WEC does not respect the IE Security settings regarding when NTLM authentication will be performed. Instead, WEC will perform NTLM authentication with any server that requests it. If a user established a session with a malicious user’s Web site, either by browsing to the site or by opening an HTML mail that initiated a session with it, an application on the site could capture the user’s NTLM credentials. The malicious user could then use an offline brute-force attack to derive the password or, with specialized tools, could submit a variant of these credentials in an attempt to access protected resources.
The vulnerability would only provide the malicious user with the cryptographically protected NTLM authentication credentials of another user. It would not, by itself, allow a malicious user to gain control of another user’s computer or to gain access to resources to which that user was authorized access. In order to leverage the NTLM credentials (or a subsequently cracked password), the malicious user would have to be able to remotely logon to the target system. However, best practices dictate that remote logon services be blocked at border devices, and if these practices were followed, they would prevent an attacker from using the credentials to logon to the target system.
Frequently asked questions regarding this vulnerability can be found
WHAT’S NEW IN VERSION MS01-001
How to Register Software With a Registration Code?
-Double-click the desktop shortcut to launch the .exe file.-Enter your name and the .exe Registration Code precisely as they appear on your registration acknowledgement email when the registration reminder window appears.
-Press Register. Enter all additional details exactly as they are listed on your registration confirmation email, including your .exe serial number.