Search
Report Types:
Products
Updates
Logs
Bugs
Files
Encounters:
Only Reports that have Encounters
Encounters must contain resolution
Home
Products
Updates
Logs
Bugs
Files
Sign In
Create an Account
Action Links
Create a Product Report
Create a Update/Patch Report
Create a Log/Event Report
Create a Bug Report
Create a File Report
Recent Search Results
No Search results are currently available to display.
Your last search results will be displayed here for the duration of your browser session.
Latest Reports
GroupPolicy Error GroupPolicy 7016
Intel WiFi 1000 BGN
Windows cannot find the local profile
Windows System Event ID 333, Application Popup, Error
test test update test
test test test
test file Information
Dell test test 1 test 1 test
test Information
test
1
2
3
4
5
...
Update Report
Print
Edit This Record
Create New
Revision
1
Name
KB977165
Type
Important
Average Threat Rating
Average Threat Rating Help
X
Loading...
Encounters
More Info
Related Content
Alert Me
Discuss
Version
Security
Release Date
2/11/2011
Summary
Microsoft Security Bulletin MS10-015 - Important
Vulnerabilities in Windows Kernel Could Allow Elevation of Privilege (977165)
Details
This security update resolves one publicly disclosed and one privately reported vulnerability in Microsoft Windows. The vulnerabilities could allow elevation of privilege if an attacker logged on to the system and then ran a specially crafted application. To exploit either vulnerability, an attacker must have valid logon credentials and be able to log on locally. The vulnerabilities could not be exploited remotely or by anonymous users.
This security update is rated Important for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, and Windows 7 for 32-bit Systems. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerabilities by ensuring that the Windows Kernel handles exceptions properly. For more information about the vulnerabilities, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.
Notes
Copyright (c) 2011
About Us
Contact Us
Privacy
Disclaimer
FAQs