The kernel in Microsoft Windows XP SP2, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly load structured exception handling tables, which allows context-dependent attackers to bypass the SafeSEH security feature by leveraging a Visual C++ .NET 2003 application, aka Windows Kernel SafeSEH Bypass Vulnerability.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Windows_7 | Microsoft | - (including) | - (including) |
Windows_7 | Microsoft | –sp1 (including) | –sp1 (including) |
Windows_server_2003 | Microsoft | * | * |
Windows_server_2008 | Microsoft | * | * |
Windows_server_2008 | Microsoft | –sp2 (including) | –sp2 (including) |
Windows_server_2008 | Microsoft | r2 (including) | r2 (including) |
Windows_vista | Microsoft | * | * |
Windows_xp | Microsoft | * | * |