Update on .LNK vulnerability
Microsoft have updated their security advisory 'Vulnerability in Windows Shell Could Allow Remote Code Execution' 2286198 to describe further attack vectors for this vulnerability. The vulnerability can be exploited using .LNK files on removable drives, via WebDav and network shares, using .PIF files as well as .LNK, and documents that can have embedded shortcuts within them. The original discussion on this vulnerability is here isc.sans.edu/diary.html?storyid=9181
The ISC has previously raised the infocon isc.sans.edu/diary.html?storyid=9190 with regards to this issue, and will continue to monitor for any changes. Please let us know via our contact us page or by commenting below if you have any new information on the issue, have been affected by this vulnerability being exploited, or have a copy of malware taking advantage of it.
Cheers,
Adrien de Beaupré
Intru-shun.ca Inc.
Comments
http://support.microsoft.com/kb/2286198
http://www.theregister.co.uk/2010/07/21/microsoft_fix_it/
Karl
Jul 21st 2010
1 decade ago
Cheers,
Adrien
Adrien de Beaupre
Jul 21st 2010
1 decade ago