Microsoft KB Archive/926043

= Microsoft Security Advisory: Vulnerability in the Windows Shell could allow remote code execution =

Article ID: 926043

Article Last Modified on 10/11/2007

-

APPLIES TO

 Microsoft Windows 2000 Datacenter Server Microsoft Windows 2000 Advanced Server Microsoft Windows 2000 Server Microsoft Windows 2000 Professional Edition Microsoft Windows Server 2003, Datacenter Edition (32-bit x86) Microsoft Windows Server 2003, Enterprise Edition Microsoft Windows Server 2003, Standard Edition (32-bit x86) Microsoft Windows Server 2003, 64-Bit Datacenter Edition</li> Microsoft Windows Server 2003, 64-Bit Enterprise Edition</li> Microsoft Windows XP Professional for Itanium-based systems</li> Microsoft Windows XP Professional for Itanium-based systems</li> Microsoft Windows XP Professional</li> Microsoft Windows XP Home Edition</li> Microsoft Windows XP Tablet PC Edition</li> Microsoft Windows XP Media Center Edition 2002</li> Microsoft Windows Server 2003, Web Edition</li> Microsoft Windows Server 2003, Standard x64 Edition</li> Microsoft Windows Server 2003, Enterprise x64 Edition</li> Microsoft Windows Server 2003, Datacenter x64 Edition</li> Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems</li> Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems</li> Microsoft Windows Server 2003 SP1, when used with: <ul> Microsoft Windows Server 2003, Standard Edition (32-bit x86)</li></ul>

<ul> Microsoft Windows Server 2003, Enterprise Edition</li></ul>

<ul> <li>Microsoft Windows Server 2003, Datacenter Edition (32-bit x86)</li></ul>

<ul> <li>Microsoft Windows Server 2003, Web Edition</li></ul>

<ul> <li>Microsoft Windows Server 2003, Standard x64 Edition</li></ul>

<ul> <li>Microsoft Windows Server 2003, Enterprise x64 Edition</li></ul>

<ul> <li>Microsoft Windows Server 2003, Datacenter x64 Edition</li></ul>

<ul> <li>Microsoft Windows Server 2003, Datacenter Edition for Itanium-Based Systems</li></ul>

<ul> <li>Microsoft Windows Server 2003, Enterprise Edition for Itanium-based Systems</li></ul> </li> <li>Microsoft Windows Server 2003 R2 Standard Edition (32-bit x86)</li> <li>Microsoft Windows Server 2003 R2 Enterprise Edition (32-Bit x86)</li> <li>Microsoft Windows Server 2003 R2 Datacenter Edition (32-Bit x86)</li> <li>Microsoft Windows Server 2003 R2 Standard x64 Edition</li> <li>Microsoft Windows Server 2003 R2 Enterprise x64 Edition</li> <li>Microsoft Windows Server 2003 R2 Datacenter x64 Edition</li> <li>Microsoft Windows XP Service Pack 1, when used with: <ul> <li>Microsoft Windows XP Home Edition</li></ul>

<ul> <li>Microsoft Windows XP Professional</li></ul>

<ul> <li>Microsoft Windows XP Media Center Edition 2002</li></ul>

<ul> <li>Microsoft Windows XP Tablet PC Edition</li></ul> </li> <li>Microsoft Windows XP Tablet PC Edition 2005</li> <li>Microsoft Windows XP Media Center Edition 2005</li> <li>Microsoft Windows XP Service Pack 2, when used with: <ul> <li>Microsoft Windows XP Professional</li></ul>

<ul> <li>Microsoft Windows XP Home Edition</li></ul> </li> <li>Microsoft Windows XP Professional x64 Edition</li> <li>Microsoft Windows 2000 Service Pack 4</li></ul>

-

<div class="summary_section">

Microsoft is investigating new public reports of vulnerability in supported versions of Microsoft Windows.

Microsoft has released a security advisory about this issue for IT professionals. This security advisory also contains additional security-related information. To view this security advisory, visit the following Microsoft Web site:

http://www.microsoft.com/technet/security/advisory/926043.mspx

Additional query words: security bug flaw vulnerability malicious attacker exploit registry unauthenticated buffer overrun overflow specially-formed scope specially-crafted denial of service

Keywords: kbtshoot kbbug kbfix kbsecvulnerability kbsecurity kbpubtypekc kbsecadvisory KB926043

-

[mailto:TECHNET@MICROSOFT.COM Send feedback to Microsoft]

© Microsoft Corporation. All rights reserved.