Untrusted search path vulnerability in Shell32.dll in Microsoft Windows 2000, Windows XP, Windows Vista, Windows Server 2008, and Windows 7, when using an environment configured with a string such as %APPDATA% or %PROGRAMFILES% in a certain way, allows local users to gain privileges via a Trojan horse DLL under the current working directory, as demonstrated by iTunes and Safari.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.acrossecurity.com/2010/10/breaking-setdlldirectory-protection.html - | |
References | () http://secunia.com/advisories/41984 - Vendor Advisory | |
References | () http://support.microsoft.com/kb/329308 - | |
References | () http://www.securityfocus.com/bid/44484 - |
Information
Published : 2012-03-28 19:55
Updated : 2024-11-21 00:40
NVD link : CVE-2007-6753
Mitre link : CVE-2007-6753
CVE.ORG link : CVE-2007-6753
JSON object : View
Products Affected
microsoft
- windows_vista
- windows_7
- windows_xp
- windows_2000
- windows_server_2008
CWE