Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://isc.sans.edu/diary.html?storyid=9181 - Broken Link | |
References | () http://isc.sans.edu/diary.html?storyid=9190 - Broken Link | |
References | () http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/ - Press/Media Coverage | |
References | () http://secunia.com/advisories/40647 - Broken Link, Vendor Advisory | |
References | () http://securitytracker.com/id?1024216 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.f-secure.com/weblog/archives/00001986.html - Not Applicable | |
References | () http://www.f-secure.com/weblog/archives/new_rootkit_en.pdf - Exploit | |
References | () http://www.kb.cert.org/vuls/id/940193 - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.microsoft.com/technet/security/advisory/2286198.mspx - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/41732 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-222A.html - Third Party Advisory, US Government Resource | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046 - Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564 - Broken Link | |
References | () https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htm - Third Party Advisory |
28 Jun 2024, 14:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://isc.sans.edu/diary.html?storyid=9181 - Broken Link | |
References | () http://isc.sans.edu/diary.html?storyid=9190 - Broken Link | |
References | () http://krebsonsecurity.com/2010/07/experts-warn-of-new-windows-shortcut-flaw/ - Press/Media Coverage | |
References | () http://secunia.com/advisories/40647 - Broken Link, Vendor Advisory | |
References | () http://securitytracker.com/id?1024216 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.f-secure.com/weblog/archives/00001986.html - Not Applicable | |
References | () http://www.kb.cert.org/vuls/id/940193 - Patch, Third Party Advisory, US Government Resource | |
References | () http://www.securityfocus.com/bid/41732 - Broken Link, Exploit, Third Party Advisory, VDB Entry | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-222A.html - Third Party Advisory, US Government Resource | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-046 - Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11564 - Broken Link | |
References | () https://www.geoffchappell.com/notes/security/stuxnet/ctrlfldr.htm - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 9.3
v3 : 7.8 |
CPE | cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:*:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:* cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:gold:itanium:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:*:itanium:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:itanium:* cpe:2.3:o:microsoft:windows_xp:-:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:-:sp2:*:*:professional:*:x64:* cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:-:-:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:x64:* |
CWE | NVD-CWE-noinfo |
07 Dec 2023, 18:38
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:microsoft:windows_vista:*:sp1:x64:*:*:*:*:* |
Information
Published : 2010-07-22 05:43
Updated : 2024-11-21 01:16
NVD link : CVE-2010-2568
Mitre link : CVE-2010-2568
CVE.ORG link : CVE-2010-2568
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_server_2003
- windows_vista
- windows_xp
- windows_7
CWE