but before you apply these "workarounds", give serious thoughts to the following adverse consequences: Perhaps, Microsoft will make an "automated fix-it" available shortly. They offer a two-phase (temporary) "work-around":ġ) Disable the displaying of icons for shortcutsĪt present, the first step requires editing one's registry (if you do, proceed with extreme caution). The vendor recommends disabling the displaying of icons for shortcuts (please see the Microsoft security advisory for details). NOTE: This is currently being actively exploited in the wild via infected USB drives. ![]() Exploitation may also be possible via network shares and WebDAV shares. tricked into inserting a removable media (when AutoPlay is enabled) or browse to the root folder of the removable media (when AutoPlay is disabled) using Windows Explorer or a similar file manager. Successful exploitation requires that a user is e.g. This can be exploited to automatically execute a program via a specially crafted shortcut. The vulnerability is caused due to an error in Windows Shell when parsing shortcuts (.lnk) as certain parameters are not properly validated when attempting to load the icon. Here's Secunia's take on the situation, copied/pasted from Ī vulnerability has been reported in Windows, which can be exploited by malicious people to compromise a user's system.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |