General 8065 Published by

On March 10, Microsoft posted a patch that eliminates a serious Registry security vulnerability. Any user who can log on interactively to a Windows NT 4.0 server or workstation; a BackOffice system; or a Windows NT Server 4.0, Terminal Server Edition (TSE) workstation can exploit this security hole to gain unauthorized privileges. The privileges let a malicious user run code in the local system context, run code when another user logs on to the same computer, and disable the security protection for an older vulnerability that lets the user cover his or her tracks after the exploit.

Read more