First published: Fri Oct 21 2005(Updated: )
Windows Shell for Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote user-assisted attackers to execute arbitrary commands via a crafted shortcut (.lnk) file with long font properties that lead to a buffer overflow when the user views the file's properties using Windows Explorer, a different vulnerability than CVE-2005-2122.
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows XP | =sp1 | |
Microsoft Windows XP | =gold | |
Microsoft Windows 2000 | ||
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp1 | |
Microsoft Windows 2000 | =sp2 | |
Microsoft Windows Server 2003 | =r2 | |
Microsoft Windows 2000 | =sp1 | |
Microsoft Windows XP | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows 2000 | =sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2118 has been classified with a medium severity rating due to the potential for remote code execution via a crafted shortcut file.
To mitigate CVE-2005-2118, users should apply the latest security patches provided by Microsoft for their affected Windows versions.
CVE-2005-2118 affects Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003.
No, CVE-2005-2118 requires user interaction, specifically viewing the properties of the malicious shortcut file.
CVE-2005-2118 exploits the Windows Shell through user-assisted attacks involving specially crafted .lnk files.