An attacker could exploit the vulnerability by sending a specially formed HTTP request to a machine running Internet Information Server (IIS). The request could cause the server to fail or to execute code of the attackerÃ???Ã??Ã?Â¢??s choice. The code would run in the security context of the IIS service (which, by default, runs in the LocalSystem context).
Although Microsoft has supplied a patch for this vulnerability and recommends customers install the patch immediately, additional tools and preventive measures have been provided that customers can use to block the exploitation of this vulnerability while they are assessing the impact and compatibility of the patch. These temporary workarounds and tools are discussed in the Ã???Ã??Ã?Â¢??WorkaroundsÃ???Ã??Ã?Â¢?? section in the FAQ below.