Microsoft Windows Vista privilege escalation vulnerability

ID VU:601073
Type cert
Reporter CERT
Modified 2007-12-11T00:00:00



Microsoft Windows Vista contains a local privilege escalation vulnerability.


The Windows Advanced Local Procedure Call (ALPC) does not properly evaluate certain conditions in legacy reply paths.

Per Microsoft Security Bulletin MS07-066:
An elevation of privilege vulnerability exists in the way that the Windows kernel processes certain access requests. This vulnerability could allow an attacker to run code and to take complete control of the system. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Note that this vulnerability is present in the 32 and 64-bit versions of Windows Vista.


A local attacker may be able to gain elevated privileges.


Microsoft has released an update to address this issue. Administrators and users should see Microsoft Security Bulletin MS07-066 for information about obtaining fixed software.

Systems Affected

Vendor| Status| Date Notified| Date Updated
Microsoft Corporation| | -| 11 Dec 2007
If you are a vendor and your product is affected, let us know.

CVSS Metrics

Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A


  • <>


Microsoft credits Thomas Garnier of SkyRecon for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2007-5350
  • Date Public: 11 Dec 2007
  • Date First Published: 11 Dec 2007
  • Date Last Updated: 11 Dec 2007
  • Severity Metric: 6.35
  • Document Revision: 5