Check: 2012-A-0196
windows 7 iavm:
2012-A-0196
(in version v1 r32)
Title
Microsoft Windows File Handling Component Remote Code Execution Vulnerability (Cat II impact)
Discussion
Microsoft has released a security bulletin addressing a vulnerability in the Windows File Handling Component. To exploit this vulnerability, an attacker would specifically craft a malicious file/folder's name and send it as an attachment via email or host a malicious website and entice a user to open the file/folder. If successfully exploited, the attacker would gain the ability to execute arbitrary code with rights of the affected user and compromise the system.
Check Content
Fix Text
Additional Identifiers
Rule ID:
Vulnerability ID: V-35488
Group Title:
Expert Comments
Expert comments are only available to logged-in users.
CCIs
CCIs tied to check.
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Controls tied to check. These are derived from the CCIs shown above.
Number | Title |
---|---|
No controls are assigned to this check |