IDNetters Forums

Technical News & Discussion => Windows News & Discussion => Topic started by: JB on Jul 20, 2010, 17:09:41

Title: Exploit demonstrates critical Windows .lnk vulnerability
Post by: JB on Jul 20, 2010, 17:09:41
http://www.h-online.com/security/news/item/Exploit-demonstrates-critical-Windows-lnk-vulnerability-1040285.htmlTo
Title: Re: Exploit demonstrates critical Windows .lnk vulnerability
Post by: Rik on Jul 20, 2010, 17:25:30
Pass me my abacus and typewriter! :(
Title: Re: Exploit demonstrates critical Windows .lnk vulnerability
Post by: DorsetBoy on Jul 20, 2010, 17:37:44
Funny, that registry entry does not exist in my Win7 system....... probably better to see this from Microsoft themselves.
Title: Re: Exploit demonstrates critical Windows .lnk vulnerability
Post by: Ray on Jul 20, 2010, 17:45:28
Microsoft information here (http://www.microsoft.com/technet/security/advisory/2286198.mspx)
Title: Re: Exploit demonstrates critical Windows .lnk vulnerability
Post by: JB on Jul 20, 2010, 17:47:15
Quote from: DorsetBoy on Jul 20, 2010, 17:37:44
Funny, that registry entry does not exist in my Win7 system....... probably better to see this from Microsoft themselves.

http://www.microsoft.com/technet/security/advisory/2286198.mspx

Look under 'Workarounds'.
Title: Re: Exploit demonstrates critical Windows .lnk vulnerability
Post by: Rik on Jul 20, 2010, 17:52:35
WIMP becomes WMP. ;D
Title: Re: Exploit demonstrates critical Windows .lnk vulnerability
Post by: DorsetBoy on Jul 20, 2010, 17:55:59
Quote from: 6jb on Jul 20, 2010, 17:47:15
http://www.microsoft.com/technet/security/advisory/2286198.mspx

Look under 'Workarounds'.


That entry HKEY_CLASSES_ROOT\lnkfile\shellex\IconHandler still does not exist in any of my systems.  Web client is disabled anyway so will just wait till M$ work their magic ::)