{"vuid":"VU#219848","idnumber":"219848","name":"Microsoft Windows Vista CSRSS privilege escalation vulnerability","keywords":["Microsoft","Windows","Vista","privilege escalation","terminate processes","ms07-apr"],"overview":"The Microsoft Windows Client/Server Run-time Subsystem (CSRSS) process fails to properly handle error messages. This vulnerability may allow an attacker to execute arbitrary code.","clean_desc":"The Microsoft Client/Server Run-time Subsystem (CSRSS) is an essential subsystem. CSRSS is responsible for console windows and creating and deleting threads. According to Microsoft Security Bulletin MS07-021: A privilege elevation vulnerability exists in the way that the Windows 32 Client/Server Run-time Subsystem (CSRSS) handles its connections during the startup and stopping of processes.","impact":"A local authenticated attacker may be able to gain elevated privileges.","resolution":"Apply update from Microsoft Microsoft has released an update for this vulnerability in Microsoft Security Bulletin MS07-021.","workarounds":"","sysaffected":"","thanks":"Thanks to Microsoft for information that was used in this report. Microsoft credits eEye for reporting this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","b","u","l","l","e","t","i","n","/","m","s","0","7","-","0","2","1",".","m","s","p","x"],"cveids":["CVE-2007-1209"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-04-06T18:23:30Z","publicdate":"2007-04-10T00:00:00Z","datefirstpublished":"2007-04-10T20:01:35Z","dateupdated":"2007-04-11T17:42:52Z","revision":13,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"4","cam_widelyknown":"9","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"4","cam_impact":"7","cam_easeofexploitation":"4","cam_attackeraccessrequired":"3","cam_scorecurrent":"0.0756","cam_scorecurrentwidelyknown":"0.1449","cam_scorecurrentwidelyknownexploited":"0.2709","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0756,"vulnote":null}