New IE Security Rollup

In keeping with the bimonthly schedule of updates, Microsoft released a security rollup for Internet Explorer (IE) 5.0 through IE 6.0 Service Pack 1 (SP1) on April 23. As is standard with rollups, this release supersedes and replaces the February IE update. The April 23 version eliminates four new script-based vulnerabilities that let an attacker either load and run code on your system, or alternatively, copy files from the local system to a destination of the attacker’s choice. Because the latest crop of flaws are exploited only through HTML code that runs on a Web server, you’d have to visit a malicious Web site to become a victim of the vulnerabilities. Unlike previous IE vulnerabilities, a malicious user can't use email to exploit these flaws, other than by presenting you with links to a Web site that contains code to leverage the script-based flaws. For more information about the nature of the vulnerabilities, see Microsoft Security Bulletin MS03-017 (Flaw in Windows Media Player Skins Downloading could allow Code Execution).

People updating Windows XP systems will be happy to hear that Microsoft corrected the bug that caused pervious rollups to fail if installed in noninteractive mode. You can successfully install this rollup on XP systems in unattended mode by using the Windows Task Scheduler, Microsoft Systems Management Server (SMS), or IBM’s Tivoli software.

This hotfix is specific to the version of IE you're running, so you’ll need to download a hotfix file for each IE version that you support. I've listed the IE Security rollup download links below. So, for example, the line for IE 5.5 SP2 below updates IE 5.5 on Windows 2000, Windows NT, Windows Me, and Windows 98. The one exception is the last download link in the list--you can install the IE 5.01 SP3 hotfix only on systems running Win2K. The download file name is q813489.exe, and the related Microsoft article is "MS03-015: April, 2003, Cumulative Patch for Internet Explorer" ( To complete installation of the rollup, you must reboot the system. To verify that the installation was successful, open the browser after the reboot, click the Help menu, and select About Internet Explorer. You should see Q813489 in the Update Versions list.
- IE 6.0 SP1 Security Update:
- IE 6.0 SP1 XP 64-bit edition Security Update:
- IE 6.0 Security Update:
- IE 5.5 SP2 Security Update:
- IE 5.01 SP3 (Win2K SP3) Security Update:

If the update causes IE to behave incorrectly, you can remove it interactively using the Control Panel Add/Remove Programs applet (select and remove Internet Explorer Q813469 from the alphabetical list). To remove this rollup at a command prompt or in a script, use the IE utility ieuninst.exe. This utility is in the %windir% directory. On XP and Win 9x systems, %windir% defaults to C:\windows; on Win2K, %windir% defaults to C:\winnt. The command c:\%windir%\ieuninst /q c:\%windir%\inf\Q813489.inf removes this patch in quiet mode (/q), which requires no user interaction.

You need to be aware of one modification in this rollup. Because of a security flaw in earlier versions of the HTML Help control, this release, like its predecessor, permanently disables the vulnerable control. If you're writing or using HTML-based Help code, you can restore the Help functionality only by installing the nonvulnerable Help Control specific to your OS. The security rollup for IE 6.0 SP1 also permanently disables an earlier ActiveX control that's vulnerable to a similar exploit.

Updated HTML Help Control Download Links

XP 64-Bit Edition


NT 4.0 (including Terminal Services edition)


TAGS: Security
Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.