Microsoft Security Advisory: Vulnerability in Windows Kernel could allow elevation of privilege
Support for Windows Vista Service Pack 1 (SP1) ends on July 12, 2011. To continue receiving security updates for Windows, make sure you're running Windows Vista with Service Pack 2 (SP2). For more information, refer to this Microsoft web page: Support is ending for some versions of Windows.
Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site:
To fix this problem automatically, click the Fix this problem link under the "Enable this fix" heading. Then, click Run in the File Download dialog box and follow the steps in this wizard.
Fix it for me
To undo the fix and restore the original settings, click the Fix this problem link under the "Disable this fix" heading. Then, click Run in the File Download dialog box and follow the steps in this wizard.
|Enable this fix||Disable this fix|
- This wizard may be in English only. However, the automatic fix also works for other language versions of Windows.
- If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem.
Known issues with this security update
- The Fix it solution checks whether if an application is running that is using NTVDM.exe. If an application that is using NTVDM is running, you will receive a message prompting you to close the application before you continue.
- The Fix it solution does not check whether the Local Group Policy Editor (GPedit.msc) is running. If GPedit.msc is running, you will not receive a message prompting you to close GPedit.msc before you continue. If you run the Fix it solution while GPedit.msc is running, you may experience the following issues:
- The GPedit.msc user interface may not reflect the DTVDM settings changes that are made by the Fix it solution until you close and then restart GPedit.msc.
- If you run the Fix it solution while GPedit.msc UI is running, and then you make additional changes in GPedit.msc without restarting GPedit.msc, the additional changes could overwrite the changes that are made by the Fix it solution. Therefore, the changes that are made by the Fix it solution may not be applied.
update security_patch security_update security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service DoS TSE WinNT Win2000
Article ID: 979682 - Last Review: 06/21/2014 13:42:00 - Revision: 4.0
Windows 7 Enterprise, Windows 7 Home Basic, Windows 7 Home Premium, Windows 7 Professional, Windows 7 Ultimate, Windows Server 2008 Service Pack 2, Windows Server 2008 Datacenter without Hyper-V, Windows Server 2008 Enterprise without Hyper-V, Windows Server 2008 Standard without Hyper-V, Windows Server 2008 Datacenter, Windows Server 2008 Enterprise, Windows Server 2008 Standard, Windows Web Server 2008, Windows Vista Service Pack 1, Windows Vista Business, Windows Vista Enterprise, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Starter, Windows Vista Ultimate, Microsoft Windows Server 2003 Service Pack 1, Microsoft Windows Server 2003 Service Pack 2, Microsoft Windows XP Service Pack 2, Microsoft Windows XP Service Pack 3, Microsoft Windows 2000 Service Pack 4
- kbexpertiseinter kbinfo kbsecadvisory kbsecurity kbsecvulnerability kbfixme kbsurveynew kbmsifixme KB979682