[Vulnerabilidad] Ejecucion Automatica de Codigo en XP

26/01/2004 - 18:24 por Ille Corvus | Informe spam
En ingles: http://www.secunia.com/advisories/10708/


Windows XP Malicious Folder Automatic Code Execution Vulnerability

Critical: Moderately critical
Impact: Privilege escalation

System access

Where: From remote
OS: Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

Description:
http-equiv has reported a vulnerability in Windows XP, which can be
exploited by malicious people to compromise a user's system or gain
escalated privileges.

It is possible to construct a malicious folder containing both script
code and an executable file. This can be exploited to make Windows
Explorer execute code automatically on a user's system if the user is
tricked into opening the folder.

A PoC (Proof of Concept) exploit is available.

Solution:
There's no proper solution available at the moment.

Grant only trusted users access to affected systems. Don't open
untrusted folders. Use updated AV software.



Descripcion:
Es posible construir una carpeta malévola que contenga código de la
escritura y un fichero ejecutable. Esto se puede explotar para hacer
que Windows ejecute el código automáticamente en el
sistema de un usuario si engañan al usuario en abrir la carpeta.

Ya esta disponible un "exploit" para dicha vulnerabilidad...

Solucion:
De momento no hay ninguna.
Actualice su programa antivirus.



Ille Corvus. Hic et Nunc.

Filtrado(s) (KillFile):
JM Tella Llop
 

Leer las respuestas

#1 Carlitos
26/01/2004 - 19:00 | Informe spam
..ese windows es puro hueco :-)

En ingles: http://www.secunia.com/advisories/10708/


Windows XP Malicious Folder Automatic Code Execution


Vulnerability

Critical: Moderately critical
Impact: Privilege escalation

System access

Where: From remote
OS: Microsoft Windows XP Home Edition
Microsoft Windows XP Professional

Description:
http-equiv has reported a vulnerability in Windows XP,


which can be
exploited by malicious people to compromise a user's


system or gain
escalated privileges.

It is possible to construct a malicious folder containing


both script
code and an executable file. This can be exploited to


make Windows
Explorer execute code automatically on a user's system if


the user is
tricked into opening the folder.

A PoC (Proof of Concept) exploit is available.

Solution:
There's no proper solution available at the moment.

Grant only trusted users access to affected systems.


Don't open
untrusted folders. Use updated AV software.



Descripcion:
Es posible construir una carpeta malévola que contenga


código de la
escritura y un fichero ejecutable. Esto se puede explotar


para hacer
que Windows ejecute el código automáticamente en el
sistema de un usuario si engañan al usuario en abrir la


carpeta.

Ya esta disponible un "exploit" para dicha


vulnerabilidad...

Solucion:
De momento no hay ninguna.
Actualice su programa antivirus.



Ille Corvus. Hic et Nunc.

Filtrado(s) (KillFile):
JM Tella Llop
.

Preguntas similares