Write msconfig and press Enter. Uncheck the box to prevent this service to start and then press OK to finish. Any change make in System Configuration will be apply after restart. Microsoft official disclaimer Warning Serious problems might occur if you modify the registry incorrectly by using Registry Editor or by using another method. These problems might require that you reinstall the operating system.
Microsoft cannot guarantee that these problems can be solved. Other versions either no longer include security update support or may not be affected. To determine the support life cycle for your product and version, visit the Microsoft Support Lifecycle Web site. This update resolves a newly discovered, privately reported, vulnerability. The vulnerability is documented in the "Vulnerability Details" section of this bulletin.
An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This assessment is based on the types of systems that are affected by the vulnerability, their typical deployment patterns, and the effect that exploiting the vulnerability would have on them. Note The severity ratings for non-x86 operating system versions map to the x86 operating systems versions as follows:.
What updates does this release replace? This security update replaces a prior security update. The security bulletin ID and affected operating systems are listed in the following table. I am still using one of these operating systems; what should I do? Windows XP all versions Service Pack 1 has reached the end of its support life cycle.
It should be a priority for customers who have these operating system versions to migrate to supported versions to prevent potential exposure to vulnerabilities. For more information about the extended security update support period for these operating system versions, visit the Microsoft Product Support Services Web site.
Windows 98, Windows 98 Second Edition, and Windows Millennium Edition have reached the end of their support life cycles. Windows NT Workstation 4. Customers who require custom support for these products must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options.
Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, visit the Microsoft Worldwide Information Web site , select the country, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. The following table provides the MBSA detection summary for this security update. For more detailed information, see Microsoft Knowledge Base Article The following table provides the SMS detection summary for this security update.
SMS 2. For SMS 2. A privilege elevation vulnerability exists in Windows Shell in the way that the operating system performs detection and registration of new hardware.
This vulnerability could allow an authenticated user to take complete control of the system. Microsoft has tested the following workarounds. Although these workarounds will not correct the underlying vulnerability, they help block known attack vectors. When a workaround reduces functionality, it is identified in the following section.
Disabling the Shell Hardware Detection service will help protect the affected system from attempts to exploit this vulnerability. To disable the Shell Hardware Detection service, follow these steps:.
You can also stop and disable the Shell Hardware Detection service by using the following command at the command prompt:. Therefore, we recommend this workaround only on systems that do not require the use of Fast User Switching. What is the scope of the vulnerability? This is a privilege elevation vulnerability.
To attempt to exploit the vulnerability, an attacker must have valid logon credentials to the system and run a program. What is the Shell Hardware Detection service?
What causes the vulnerability? A function parameter in the hardware initialization and detection capabilities of Microsoft Windows was not validated. What might an attacker use the vulnerability to do? An attacker who successfully exploited this vulnerability could take complete control of the affected system. Who could exploit the vulnerability? Navigation Microsoft security bulletins. Windows event ID encyclopedia. Windows group policy encyclopedia.
Windows services encyclopedia A M N-Q R
0コメント