Executive Summary
Summary | |
---|---|
Title | Microsoft Windows automatically executes code specified in shortcut files |
Informations | |||
---|---|---|---|
Name | VU#824672 | First vendor Publication | 2017-08-03 |
Vendor | VU-CERT | Last vendor Modification | 2017-08-09 |
Severity (Vendor) | N/A | Revision | M |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 9.3 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Vulnerability Note VU#824672Microsoft Windows automatically executes code specified in shortcut filesOverviewMicrosoft Windows automatically executes code specified in shortcut (LNK) files. Description
Impact
Solution
Vendor Information (Learn More)
CVSS Metrics (Learn More)
References
CreditThis document was written by Will Dormann. Other Information
FeedbackIf you have feedback, comments, or additional information about this vulnerability, please send us email. |
Original Source
Url : http://www.kb.cert.org/vuls/id/824672 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-426 | Untrusted Search Path |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11564 | |||
Oval ID: | oval:org.mitre.oval:def:11564 | ||
Title: | Windows Shell Vulnerability | ||
Description: | Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2010-2568 | Version: | 9 |
Platform(s): | Microsoft Windows XP Microsoft Windows Server 2003 Microsoft Windows Server 2008 Microsoft Windows Server 2008 R2 Microsoft Windows Vista Microsoft Windows 7 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28609 | |||
Oval ID: | oval:org.mitre.oval:def:28609 | ||
Title: | DLL planting remote code execution vulnerability - CVE-2015-0096 (MS15-020) | ||
Description: | Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2015-0096 | Version: | 3 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:28624 | |||
Oval ID: | oval:org.mitre.oval:def:28624 | ||
Title: | DEPRECATED: DLL planting remote code execution vulnerability - CVE-2015-0096 (MS15-020) | ||
Description: | Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2015-0096 | Version: | 4 |
Platform(s): | Microsoft Windows Server 2003 Microsoft Windows Vista Microsoft Windows Server 2008 Microsoft Windows 7 Microsoft Windows Server 2008 R2 Microsoft Windows 8 Microsoft Windows 8.1 Microsoft Windows Server 2012 Microsoft Windows Server 2012 R2 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 2 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os | 1 | |
Os |
| 6 |
Os | 2 | |
Os | 1 | |
Os | 2 | |
Os | 2 |
SAINT Exploits
Description | Link |
---|---|
Windows Shell LNK file CONTROL item command execution | More info here |
OpenVAS Exploits
Date | Description |
---|---|
2010-08-04 | Name : Microsoft Windows Shell Remote Code Execution Vulnerability (2286198) File : nvt/secpod_ms10-046.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
66387 | Microsoft Windows Shell LNK File Parsing Arbitrary Command Execution Windows contains a flaw that may allow an attacker to execute arbitrary code. The issue is triggered by a specially crafted .LNK or .PIF shortcut file which contains an icon resource that points to a malicious DLL file. |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-03-12 | IAVM : 2015-A-0053 - Multiple Vulnerabilities in Microsoft Windows (MS15-020) Severity : Category II - VMSKEY : V0059001 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-07-13 | Win.Trojan.Fanny outbound connection RuleID : 34857 - Revision : 2 - Type : MALWARE-CNC |
2014-01-10 | DNS request for known malware domain level4-co1-as30912.su RuleID : 28067 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain level4-co2-as30938.su RuleID : 28066 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain x2v9.com RuleID : 28065 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain intelbackupsrv.su RuleID : 28064 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain intelsystems.su RuleID : 28063 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain intelsecurity.su RuleID : 28062 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | DNS request for known malware domain intelcore.su RuleID : 28061 - Revision : 2 - Type : BLACKLIST |
2014-01-10 | Microsoft LNK shortcut arbitrary dll load attempt RuleID : 24500 - Revision : 6 - Type : FILE-OTHER |
2014-01-10 | Microsoft LNK shortcut download attempt RuleID : 19291 - Revision : 4 - Type : NETBIOS |
2014-01-10 | Microsoft LNK shortcut arbitary dll load attempt RuleID : 19290 - Revision : 9 - Type : FILE-OTHER |
2014-01-10 | Microsoft Windows PIF shortcut file download request RuleID : 17043 - Revision : 9 - Type : FILE-IDENTIFY |
2014-01-10 | Microsoft LNK shortcut arbitrary dll load attempt RuleID : 17042 - Revision : 17 - Type : FILE-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-06-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_4025685_vista.nasl - Type : ACT_GATHER_INFO |
2017-06-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_win2008.nasl - Type : ACT_GATHER_INFO |
2017-06-14 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_windows8.nasl - Type : ACT_GATHER_INFO |
2017-06-13 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_4022714.nasl - Type : ACT_GATHER_INFO |
2017-06-13 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_4022715.nasl - Type : ACT_GATHER_INFO |
2017-06-13 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_4022719.nasl - Type : ACT_GATHER_INFO |
2017-06-13 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_4022724.nasl - Type : ACT_GATHER_INFO |
2017-06-13 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_4022725.nasl - Type : ACT_GATHER_INFO |
2017-06-13 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_4022726.nasl - Type : ACT_GATHER_INFO |
2017-06-13 | Name : The remote Windows host is affected by multiple vulnerabilities. File : smb_nt_ms17_jun_4022727.nasl - Type : ACT_GATHER_INFO |
2015-03-10 | Name : The remote Windows host is affected by multiple remote code execution vulnera... File : smb_nt_ms15-020.nasl - Type : ACT_GATHER_INFO |
2010-08-02 | Name : The remote windows host is affected by a remote code execution vulnerability. File : smb_nt_ms10-046.nasl - Type : ACT_GATHER_INFO |
2010-07-18 | Name : It may be possible to execute arbitrary code on the remote Windows host using... File : smb_kb_2286198.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-08-09 17:22:22 |
|
2017-08-04 21:22:56 |
|
2017-08-04 00:21:24 |
|