"Microsoft Windows Domain Name System (DNS) Server Service is prone to a stack-based buffer-overflow vulnerability in its Remote Procedure Call (RPC) interface.
A remote attacker may exploit this issue to run arbitrary code in the context of the DNS Server Service. The DNS service runs in the 'SYSTEM' context.
Successfully exploiting this issue allows attackers to execute arbitrary code, facilitating the remote compromise of affected computers."
Yet another brand new vulnerability in a Microsoft service; this one yielding SYSTEM privileges. While SecurityFocus doesn't have a proof-of-concept exploit, they do have a module for MetaSploit that will aid in the creation of working exploits.