Microsoft Windows Class Name String Atom Privilege Escalation Exploit (MS12-041)

An error in the way that the Windows kernel handles string atoms when registering a new window class allows unprivileged users to re-register atoms of privileged applications. This vulnerability can be exploited by local unprivileged users to execute arbitrary code with SYSTEM privileges.
Exploit type: 
Vulnerabilty ID: 
Product Version: 
Released Date: 
Tuesday, October 1, 2013 - 00:00