First published: Thu Dec 26 2002(Updated: )
Buffer overflow in the Windows Shell function in Microsoft Windows XP allows remote attackers to execute arbitrary code via an .MP3 or .WMA audio file with a corrupt custom attribute, aka "Unchecked Buffer in Windows Shell Could Enable System Compromise."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =gold | |
Microsoft Windows XP | ||
Microsoft Windows XP | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =gold |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1327 is rated as critical due to its potential to allow remote code execution.
The recommended fix for CVE-2002-1327 is to apply the appropriate Microsoft security updates for Windows XP.
CVE-2002-1327 affects Windows XP versions specifically with Service Pack 1 and the original gold release.
CVE-2002-1327 exploits a buffer overflow in the Windows Shell function related to improperly handled audio file attributes.
To mitigate risks, avoid opening untrusted .MP3 or .WMA files and ensure your system is updated with the latest security patches.