News

Flaw Lets Attackers Run Code on Windows XP

Microsoft alerted users Wednesday night to a critical flaw arising from an unchecked buffer in the Windows XP Shell that could be used to run code of an attacker's choice. The flaw occurs when opening or even hovering over malicious audio files.

Among other functions, the Windows Shell provides the means to start applications. The process the Windows Shell uses to extract custom attribute information from audio files contains an unchecked buffer. A malicious user can exploit the vulnerability with a buffer overrun attack to either cause the Windows Shell to fail or run code in the security context of the user.

To exploit this vulnerability an attacker must have the social engineering skills to entice a user to open or hover over a maliciously created MP3 or Windows Media Audio file from a Web site, network share or HTML e-mail.

"If a user were to hover his or her mouse pointer over the icon for the file (either on a Web page or on the local disk), or open the shared folder where the file was stored, the vulnerable code would be invoked. An HTML e-mail could cause the vulnerable code to be invoked when a user opened or previewed the e-mail," Microsoft's bulletin warns.

The security bulletin, MS02-072, is the 19th of the year affecting Windows XP, and the 21st Windows XP security bulletin since the product was introduced last year.

The bulletin may be found at:
www.microsoft.com/technet/security/bulletin/MS02-072.asp.

On Thursday, the CERT Coordination Center buttressed Microsoft's bulletin with a warning of its own about the flaw. The CERT advisory is available at www.cert.org/advisories/CA-2002-37.html.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Microsoft Publishes Windows Deadlines on Upgrading to SHA-2

    Microsoft on Friday described its 2019 timeline for when it will start distrusting Shell Hashing Algorithm-1 (SHA-1) in supported Windows systems, as well as in the Windows Server Update Services 3.0 Service Pack 2 management product.

  • Performing a Storage Refresh on Windows Server 2016, Part 1

    To spruce up some aging lab hardware, Brien decided to make the jump to all-flash storage. Here's a walk-through of the first half of the process.

  • Datacenters Are Cooling Down as Buildouts Heat Up

    Tech giants Google, Apple and others are expanding their datacenter footprints at a rapid rate, and it's pushing the industry to find better ways to power all that infrastructure.

  • Vendors Issue Patches for Linux Container Runtime Flaw Enabling Host Attacks

    This week, the National Institute of Standards and Technology (NIST) described a high-risk security vulnerability (CVE-2019-5736) for organizations using containers that could lead to compromised host systems.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.