Affected Versions:
Microsoft Vista x64 Edition SP2
Microsoft Vista x64 Edition SP1
Microsoft Vista x64 Edition 0
Microsoft Vista Ultimate SP2
Microsoft Vista Ultimate SP1
Microsoft Vista Ultimate 64-bit edition SP2
Microsoft Vista Ultimate 64-bit edition SP1
Microsoft Vista Ultimate 64-bit edition 0
Microsoft Vista Ultimate
Microsoft Vista SP2
Microsoft Vista SP1
Microsoft Vista Home Premium SP2
Microsoft Vista Home Premium SP1
Microsoft Vista Home Premium 64-bit edition SP
Microsoft Vista Home Premium 64-bit edition SP
Microsoft Vista Home Premium 64-bit edition 0
Microsoft Vista Home Premium
Microsoft Vista Home Basic SP2
Microsoft Vista Home Basic SP1
Microsoft Vista Home Basic 64-bit edition Sp2
Microsoft Vista Home Basic 64-bit edition Sp2
Microsoft Vista Home Basic 64-bit edition Sp1
Microsoft Vista Home Basic 64-bit edition Sp1
Microsoft Vista Home Basic 64-bit edition 0
Microsoft Vista Home Basic
Microsoft Vista Enterprise SP2
Microsoft Vista Enterprise SP1
Microsoft Vista Enterprise 64-bit edition SP2
Microsoft Vista Enterprise 64-bit edition SP1
Microsoft Vista Enterprise 64-bit edition 0
Microsoft Vista Enterprise
Microsoft Vista Business SP2
Microsoft Vista Business SP1
Microsoft Vista Business 64-bit edition SP2
Microsoft Vista Business 64-bit edition SP1
Microsoft Vista Business 64-bit edition 0
Microsoft Vista Business
Microsoft Vista 0
Microsoft Server 2008
Microsoft Windows 7
Vulnerability description:
Microsoft Windows is a very popular operating system released by Microsoft.
Microsoft Windows has a vulnerability. A local attacker can exploit this vulnerability to execute arbitrary code with system-level permissions. Successful exploitation of this vulnerability can completely manipulate the affected computer and cause a denial of service (DoS.
<* Reference
Noobpwnftw
*>
Test method:
Noobpwnftw provides the following test methods:
Http://www.securityfocus.com/data/vulnerabilities/exploits/45045.zip
Security suggestions:
Vendor patch:
Microsoft
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.microsoft.com/technet/security/