Microsoft Windows contains a vulnerability that could allow a local attacker to cause the system to restart, resulting in a denial of service condition. Updates are available.
Microsoft Windows contains a vulnerability that could allow a local attacker to cause a denial of service (DoS) condition.
The vulnerability is due to errors when the Windows kernel handles exceptions. A local attacker could exploit the vulnerability by running a malicious executable. If successful, the attacker could cause the system to restart, resulting in a DoS condition.
Microsoft has confirmed this vulnerability in a security bulletin and released updated software.
The following Microsoft systems are affected:
Windows Vista SP2 and prior
Windows Vista x64 Edition SP2 and prior
Windows Server 2008 for 32-bit Systems SP2 and prior
Windows Server 2008 for x64-based Systems SP2 and prior
Windows Server 2008 for Itanium-based Systems SP2 and prior
An attacker must be able to log on locally to a system and execute a malicious program to exploit the vulnerability. The attacker must possess authentication credentials that are sufficient to log on to the system as well as either physical access to the system console or a remote method, such as Terminal Services or Remote Desktop. The access requirements likely limit the pool of attackers to current users of the affected system. An attacker cannot exploit this vulnerability to gain additional privileges on the system.
Microsoft has released a security bulletin available at the following link: MS10-021
A local attacker could exploit this vulnerability to cause the system to stop responding and restart, resulting in a DoS condition.
The vulnerability is due to errors that occur when the Windows kernel handles exceptions. A local attacker could exploit this vulnerability by running a malicious program that is designed to trigger an exception error that may be improperly handled. When the error occurs, the kernel may cause the system to fail and restart, resulting in a DoS condition.
Administrators are advised to install the appropriate updates.
Administrators are advised to restrict local system access to trusted users.
Administrators are advised to monitor critical systems.
Microsoft customers can obtain updates directly by using the links in the security bulletin. These updates are also distributed by Windows automatic update features and available on the Windows Update website. Microsoft Windows Server Update Services (WSUS), Systems Management Server, and System Center Configuration Manager can assist administrators in deploying software updates.
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.