Microsoft Windows & Nortel TCP/IP TimeStamps Remote Code Execution Vulnerability

http://www.securityfocus.com/bid/36265/info

"Microsoft Windows TCP/IP protocol implementation is prone to a remote
code-execution vulnerability.

An attacker can exploit this issue to execute arbitrary code with
SYSTEM-level privileges. Successful attacks will completely compromise
affected computers."

An exploit has been successfully implemented in a commercial application.

Microsoft has implemented patches for the vulnerable operating systems,
Vista, Server 2008 and Nortel Networks CallPilot, Nortel Networks
Contact Center, Nortel Networks Self-Service.

Microsoft Security Update for Windows Vista (KB967723)
Microsoft Security Update for Windows Vista (KB967723)
Microsoft Security Update for Windows Server 2008 x64 Edition (KB967723)
Microsoft Security Update for Windows Server 2008 for Itanium-based
Systems (KB967723)
Microsoft Security Update for Windows Server 2008 (KB967723)
Microsoft Security Update for Windows Vista for x64-based Systems (KB967723)
Microsoft Security Update for Windows Server 2008 x64 Edition (KB967723)
Microsoft Security Update for Windows Vista (KB967723)
Microsoft Security Update for Windows Server 2008 for Itanium-based
Systems (KB967723)
Microsoft Security Update for Windows Vista for x64-based Systems (KB967723)
Microsoft Security Update for Windows Server 2008 (KB967723)
Microsoft Security Update for Windows Vista (KB967723)
Microsoft Security Update for Windows Vista for x64-based Systems (KB967723)

This is a Priority 1, Severity 1 issue that should be resolved as soon
as possible.

Thanks,
Brian