Vulnerability Note VU#740636
Microsoft Windows CSRSS error handling vulnerability
The Microsoft Windows Client/Server Run-time Subsystem (CSRSS) process fails to properly handle error messages. This vulnerability may allow a remote attacker to execute arbitrary code.
According to Microsoft Security Bulletin MS07-021:
CSRSS is the user-mode portion of the Win32 subsystem. CSRSS stands for client/server run-time subsystem and is an essential subsystem that must be running at all times. CSRSS is responsible for console windows, creating and/or deleting threads.
More information is available in Microsoft Security Bulletin MS07-021.
Note that proof-of-concept code is available for this vulnerability.
A remote attacker may be able to execute arbitrary code on a vulnerable system.
Apply update from Microsoft
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Microsoft Corporation||Affected||-||10 Apr 2007|
CVSS Metrics (Learn More)
This vulnerability was reported by Tim Garnett of Determina Security Research .
This document was written by Jeff Gennari.
- CVE IDs: CVE-2006-6797
- Date Public: 15 Dec 2006
- Date First Published: 11 Apr 2007
- Date Last Updated: 11 Apr 2007
- Severity Metric: 7.44
- Document Revision: 12
If you have feedback, comments, or additional information about this vulnerability, please send us email.