9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.973 High
EPSS
Percentile
99.8%
Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.
Recent assessments:
loneicewolf at February 08, 2021 8:53pm UTC reported:
<https://github.com/loneicewolf/fanny.bmp/blob/main/Reports/Fanny.BMP(DementiaWheel)_Technical_Report_By_WilliamMartens-2021-10Feb.pdf>
Technical Write up: DONE. Finally, it’s available here for read
(and, please feedback! if you have any)
<https://www.youtube.com/watch?v=Uto_lcD2f38> POC video for windows xp SP3
Sample:(GitHub) <https://github.com/loneicewolf/fanny.bmp>
Assessed Attacker Value: 4
Assessed Attacker Value: 4Assessed Attacker Value: 5
isc.sans.edu/diary.html?storyid=9181
isc.sans.edu/diary.html?storyid=9190
krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw
secunia.com/advisories/40647
securitytracker.com/id?1024216
www.f-secure.com/weblog/archives/00001986.html
www.f-secure.com/weblog/archives/new_rootkit_en.pdf
www.kb.cert.org/vuls/id/940193
www.microsoft.com/technet/security/advisory/2286198.mspx
www.securityfocus.com/bid/41732
www.us-cert.gov/cas/techalerts/TA10-222A.html
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2568
docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564
www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htm