Microsoft Windows XP (32-bit) Unchecked Buffer Vulnerability Patch Specifications
|
Prevent malicious users from compromising your computer and gaining complete control over your Windows XP system.
An unchecked buffer exists in one of the functions used by the Windows Shell to extract custom attribute information from audio files. A security vulnerability results because it is possible for a malicious user to mount a buffer overrun attack and attempt to exploit this flaw.
An attacker could seek to exploit this vulnerability by creating an MP3 or a WMA file that contains a corrupt custom attribute and then host it on a Web site or on a network share, or send it via an HTML e-mail. If a user were to hover his or her mouse pointer over the icon for the file (either on a Web page or on the local disk), or open the shared folder where the file is stored, the vulnerable code would be invoked. An HTML e-mail could cause the vulnerable code to be invoked when a user opens or previews the e-mail. A successful attack could have the effect of either causing the Windows Shell to fail, or causing an attacker's code to run on the user's computer in the security context of the user.
Openconnect VPN Client 464 |
Hotspot Shield 290 |
Spotflux 261 |
Hide Files 232 |
Hola Accelerator 64-bit 203 |
WirelessKeyView 203 |
Eudora Password Recovery 203 |
CryptoForge 203 |
AirSnare 203 |
Folder Lock 203 |