Update on .LNK vulnerability

Published: 2010-07-21
Last Updated: 2011-01-25 00:07:49 UTC
by Adrien de Beaupre (Version: 1)
2 comment(s)

Microsoft have updated their security advisory 'Vulnerability in Windows Shell Could Allow Remote Code Execution' 2286198 to describe further attack vectors for this vulnerability. The vulnerability can be exploited using .LNK files on removable drives, via WebDav and network shares, using .PIF files as well as .LNK, and documents that can have embedded shortcuts within them. The original discussion on this vulnerability is here isc.sans.edu/diary.html?storyid=9181

The ISC has previously raised the infocon isc.sans.edu/diary.html?storyid=9190 with regards to this issue, and will continue to monitor for any changes. Please let us know via our contact us page or by commenting below if you have any new information on the issue, have been affected by this vulnerability being exploited, or have a copy of malware taking advantage of it.

Cheers,
Adrien de Beaupré
Intru-shun.ca Inc.

2 comment(s)

Comments

Microsoft issues stopgap fix for critical Windows flaw

http://support.microsoft.com/kb/2286198
http://www.theregister.co.uk/2010/07/21/microsoft_fix_it/
But is it sufficient?

Cheers,
Adrien

Diary Archives