Microsoft has reported a buffer overflow vulnerability in Windows Media Services. This is due to a problem with how the logging ISAPI extension handles incoming client requests. This could cause arbitrary code execution in IIS, which is exploitable through Media Services.
Block external access at the network boundary, unless external parties require service.
Filter client requests to streaming media servers by external or untrusted hosts and networks at the network perimeter. Traffic to the logging server should be also be blocked at network firewalls and routers.
Disable any unneccessary default services.
Do not install Media Services or any other components that are not explicitly required.
** March 9, 2004 - Microsoft has reported that under certain circumstances the original security update provided to address this issue did not function properly and failed to replace the vulnerable file on an affected system. The issue results in situations relating to whether or not Windows Media Services was uninstalled previous to the application of the update. Microsoft has addressed this issue and released an updated Security Bulletin MS03-022. Please see the referenced bulletin for more information. A patch has been made available for Windows 2000 and Windows 2000 Service Pack 3: