Not strictly a windows problem, but a anti-virus software one.
The attack is fairly simple:
Under normal conditions it works like this:
1. Anti-virus software intercepts OS system functions from application software (e.g. start program 'Virus.exe')
2. AV software scans the request (e.g. scans the file)
3. If request is malicious, the AV software fakes an OS error (e.g. Access denied)
4. If the request is legit, the request is passed onto the OS for normal processing.
The attack works like this:
1. Malicious software sends benign request (e.g. start progam 'hello world.exe')
2. AV software scans the request
2b. Simultaneously, a 2nd thread in the malicious program (running on another CPU core) accesses changes the reference to 'hello world.exe' to 'virus.exe'
3. AV software finishes scanning 'hello world.exe' and it passes. It then takes the request (which now contains 'virus.exe') and sends it to the OS for normal processing.