Microsoft Windows Shortcut Remote Code Execution Vulnerability
Publish date: July 21, 2015
Severity: CRITICAL
CVE Identifier: CVE-2010-2568
Advisory Date: JUL 21, 2015
DESCRIPTION
Windows Shell in Microsoft Windows XP SP3, Server 2003 SP2, Vista SP1 and SP2, Server 2008 SP2 and R2, and Windows 7 allows local users or remote attackers to execute arbitrary code via a crafted (1) .LNK or (2) .PIF shortcut file, which is not properly handled during icon display in Windows Explorer, as demonstrated in the wild in July 2010, and originally reported for malware that leverages CVE-2010-2772 in Siemens WinCC SCADA systems.
TREND MICRO PROTECTION INFORMATION
Per: http://www.microsoft.com/technet/security/advisory/2286198.mspx
Microsoft has completed the investigation into a public report of this vulnerability. We have issued MS10-046 to address this issue.
http://www.microsoft.com/technet/security/bulletin/MS10-046.mspx
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1004314
Trend Micro Deep Security DPI Rule Name: 1004314 - Identified LNK/PIF File Over SMTP
AFFECTED SOFTWARE AND VERSION
- Microsoft Windows XP
- Microsoft Windows Vista
- Microsoft Windows Server 2008 r2
- Microsoft Windows Server 2008
- Microsoft Windows Server 2003
- Microsoft Windows 7
- Microsoft Windows 2003 Server
Featured Stories
- Abusing Argo CD, Helm, and Artifact Hub: An Analysis of Supply Chain Attacks in Cloud-Native ApplicationsWe provide an overview of cloud-native tools and examine how cybercriminals can exploit their vulnerabilities to launch supply chain attacks.Read more
- Trends and Shifts in the Underground N-Day Exploit MarketOur two-year research provides insights into the life cycle of exploits, the types of exploit buyers and sellers, and the business models that are reshaping the underground exploit market.Read more
- The Nightmares of Patch Management: The Status Quo and BeyondWe discuss the challenges that organizations face in managing endpoint and server patches.Read more
- Identifying Weak Parts of a Supply ChainMalicious attacks have consistently been launched on weak points in the supply chain. Like all attacks, these will evolve into more advanced forms. Software development, with multiple phases that could be placed at risk, is particularly vulnerable.Read more