Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

Microsoft Security Advisory: Vulnerability in Windows Kernel could allow elevation of privilege


View products that this article applies to.

Support for Windows Vista Service Pack 1 (SP1) ends on July 12, 2011. To continue receiving security updates for Windows, make sure you're running Windows Vista with Service Pack 2 (SP2). For more information, refer to this Microsoft web page: Support is ending for some versions of Windows.

↑ Back to the top


INTRODUCTION

Microsoft has released a Microsoft security advisory about this issue for IT professionals. The security advisory contains additional security-related information. To view the security advisory, visit the following Microsoft Web site:

↑ Back to the top


Fix it for me

To fix this problem automatically, click the Fix this problem link under the "Enable this fix" heading. Then, click Run in the File Download dialog box and follow the steps in this wizard.


To undo the fix and restore the original settings, click the Fix this problem link under the "Disable this fix" heading. Then, click Run in the File Download dialog box and follow the steps in this wizard.



Enable this fixDisable this fix
Notes
  • This wizard may be in English only. However, the automatic fix also works for other language versions of Windows.
  • If you are not on the computer that has the problem, you can save the automatic fix to a flash drive or to a CD, and then you can run it on the computer that has the problem.

Known issues with this security update

  • The Fix it solution checks whether if an application is running that is using NTVDM.exe. If an application that is using NTVDM is running, you will receive a message prompting you to close the application before you continue.
  • The Fix it solution does not check whether the Local Group Policy Editor (GPedit.msc) is running. If GPedit.msc is running, you will not receive a message prompting you to close GPedit.msc before you continue. If you run the Fix it solution while GPedit.msc is running, you may experience the following issues:


    • The GPedit.msc user interface may not reflect the DTVDM settings changes that are made by the Fix it solution until you close and then restart GPedit.msc.
    • If you run the Fix it solution while GPedit.msc UI is running, and then you make additional changes in GPedit.msc without restarting GPedit.msc, the additional changes could overwrite the changes that are made by the Fix it solution. Therefore, the changes that are made by the Fix it solution may not be applied.


    To avoid these issues, we recommend that you close GPedit.msc before you run the Fix it solution.
Note You can use the gpupdate /force command in the Fix it solution make sure that the registry is updated. On some computers, this command may cause the Fix-it solution to take more time to be completed.


↑ Back to the top


Keywords: kb, kbsecreview, kbexpertiseinter, kbinfo, kbsecadvisory, kbsecurity, kbsecvulnerability, kbfixme, kblangall, kbmustloc, kbsurveynew, kbmsifixme

↑ Back to the top

Article Info
Article ID : 979682
Revision : 1
Created on : 1/7/2017
Published on : 6/21/2014
Exists online : False
Views : 314