{"vuid":"VU#922708","idnumber":"922708","name":"Microsoft Windows Shell fails to handle shortcut files properly","keywords":["Microsoft","Windows","Shell","remote code execution",".lnk file","MS05-049"],"overview":"Microsoft Windows Shell does not properly handle some shortcut files and may permit arbitrary code execution when a specially-crafted file is opened.","clean_desc":"Microsoft Windows supports files that point to another file, called \"shortcut\" files. These files have the .lnk extension, and may have properties that are passed to the target program or file. Windows does not properly handle some properties on shortcut files and may be vulnerable to a specially-crafted shortcut file format. An attacker that has crafted such a shortcut file and that has convinced a user to open the file may be able to execute arbitrary code on the system. This file may be opened from an email message or a web link. The arbitrary code is executed with the user's privileges, so if an administrative user has opened the file, the attacker may be able to take complete control of the system.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code and take complete control of the system.","resolution":"Apply an update\nPlease see Microsoft Security Bulletin MS05-049 for more information on fixes, workarounds, and updates.","workarounds":"","sysaffected":"","thanks":"Microsoft reported this vulnerability, and in turn thank Cesar Cerrudo of Argeniss for information on the issue.","author":"This document was written by Ken MacInnis.","public":["h","t","t","p",":","/","/","w","w","w",".","m","i","c","r","o","s","o","f","t",".","c","o","m","/","t","e","c","h","n","e","t","/","s","e","c","u","r","i","t","y","/","B","u","l","l","e","t","i","n","/","M","S","0","5","-","0","4","9",".","m","s","p","x"],"cveids":["CVE-2005-2122"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-10-11T18:50:12Z","publicdate":"2005-10-11T00:00:00Z","datefirstpublished":"2005-10-11T20:31:53Z","dateupdated":"2005-10-11T20:51:59Z","revision":11,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"14","cam_population":"15","cam_impact":"18","cam_easeofexploitation":"2","cam_attackeraccessrequired":"18","cam_scorecurrent":"5.28525","cam_scorecurrentwidelyknown":"6.1965","cam_scorecurrentwidelyknownexploited":"9.8415","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.28525,"vulnote":null}