Microsoft Windows Shell does not properly handle some shortcut files and may permit arbitrary code execution when a specially-crafted file is opened.
Microsoft Windows supports files that point to another file, called "shortcut" files. These files have the .lnk extension, and may have properties that are passed to the target program or file.
Windows does not properly handle some properties on shortcut files and may be vulnerable to a specially-crafted shortcut file format. An attacker that has crafted such a shortcut file and that has convinced a user to open the file may be able to execute arbitrary code on the system. This file may be opened from an email message or a web link.
A remote, unauthenticated attacker may be able to execute arbitrary code and take complete control of the system.
Apply an update
Microsoft Corporation Affected
Updated: October 11, 2005
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see Microsoft Security Bulletin MS05-049 for more information.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Microsoft reported this vulnerability, and in turn thank Cesar Cerrudo of Argeniss for information on the issue.
This document was written by Ken MacInnis.
|Date First Published:||2005-10-11|
|Date Last Updated:||2005-10-11 20:51 UTC|