CVE-2010-2568

Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*

History

28 Jun 2024, 14:02

Type Values Removed Values Added
CVSS v2 : 9.3
v3 : unknown
v2 : 9.3
v3 : 7.8
CPE cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:*
cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:*
cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:*
CWE CWE-20 NVD-CWE-noinfo
References () http://isc.sans.edu/diary.html?storyid=9181 - () http://isc.sans.edu/diary.html?storyid=9181 - Broken Link
References () http://isc.sans.edu/diary.html?storyid=9190 - () http://isc.sans.edu/diary.html?storyid=9190 - Broken Link
References () http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/ - () http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/ - Press/Media Coverage
References () http://secunia.com/advisories/40647 - Vendor Advisory () http://secunia.com/advisories/40647 - Broken Link, Vendor Advisory
References () http://securitytracker.com/id?1024216 - () http://securitytracker.com/id?1024216 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.f-secure.com/weblog/archives/00001986.html - () http://www.f-secure.com/weblog/archives/00001986.html - Not Applicable
References () http://www.kb.cert.org/vuls/id/940193 - Patch, US Government Resource () http://www.kb.cert.org/vuls/id/940193 - Patch, Third Party Advisory, US Government Resource
References () http://www.securityfocus.com/bid/41732 - Exploit () http://www.securityfocus.com/bid/41732 - Broken Link, Exploit, Third Party Advisory, VDB Entry
References () http://www.us-cert.gov/cas/techalerts/TA10-222A.html - US Government Resource () http://www.us-cert.gov/cas/techalerts/TA10-222A.html - Third Party Advisory, US Government Resource
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046 - Patch, Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564 - Broken Link
References () https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htm - () https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htm - Third Party Advisory

07 Dec 2023, 18:38

Type Values Removed Values Added
CPE cpe:2.3:o:microsoft:windows_vista:*:sp2:x64:*:*:*:*:*
cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:*

Information

Published : 2010-07-22 05:43

Updated : 2024-06-28 14:02


NVD link : CVE-2010-2568

Mitre link : CVE-2010-2568

CVE.ORG link : CVE-2010-2568


JSON object : View

Products Affected

microsoft

  • windows_xp
  • windows_7
  • windows_vista
  • windows_server_2008
  • windows_server_2003