CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
EPSS
Percentile
0.4%
Microsoft Windows Vista contains a local privilege escalation vulnerability.
The Windows Advanced Local Procedure Call (ALPC) does not properly evaluate certain conditions in legacy reply paths.
Per Microsoft Security Bulletin MS07-066:
An elevation of privilege vulnerability exists in the way that the Windows kernel processes certain access requests. This vulnerability could allow an attacker to run code and to take complete control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Note that this vulnerability is present in the 32 and 64-bit versions of Windows Vista.
A local attacker may be able to gain elevated privileges.
Update
Microsoft has released an update to address this issue. Administrators and users should see Microsoft Security Bulletin MS07-066 for information about obtaining fixed software.
601073
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: December 11, 2007
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
See <http://www.microsoft.com/technet/security/bulletin/ms07-066.mspx> for more information.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23601073 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
<http://www.microsoft.com/technet/security/bulletin/ms07-066.mspx>
Microsoft credits Thomas Garnier of SkyRecon for reporting this vulnerability.
This document was written by Ryan Giobbi.
CVE IDs: | CVE-2007-5350 |
---|---|
Severity Metric: | 6.35 Date Public: |