Lucene search

K
saintSAINT CorporationSAINT:D73D956898E75970CBB67DF23C41B8A0
HistoryJul 22, 2010 - 12:00 a.m.

Windows Shell LNK file CONTROL item command execution

2010-07-2200:00:00
SAINT Corporation
my.saintcorporation.com
129

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%

Added: 07/22/2010
CVE: CVE-2010-2568
BID: 41732
OSVDB: 66387

Background

Microsoft Windows supports LNK files, also known as shortcuts, which are references to other files. Shortcuts can be placed in a location which is convenient for users (such as the Desktop or Start menu), from which they can be used to execute the referenced file.

Problem

A design weakness in the Windows shell allows command execution when a user opens a shortcut file containing a CONTROL item which specifies a malicious executable DLL. The shortcut file could be given to the user on removable media such as a USB flash drive.

Resolution

See Microsoft Security Advisory 2286198 for patch information or workarounds.

References

<http://www.kb.cert.org/vuls/id/940193&gt;

Limitations

The specified SMB share must be accessible by the target user. Before the exploit can succeed, download the exploit.dll file and place it on the specified share.

The user must double-click on the shortcut file in order for this exploit to succeed.

Platforms

Windows

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.972 High

EPSS

Percentile

99.8%