Microsoft Windows XP Explorer allows local users to execute arbitrary code via a system folder with a Desktop.ini file containing a .ShellClassInfo specifier with a CLSID value that is associated with an executable file.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/16171 | vdb entry |
http://secunia.com/advisories/11633 | third party advisory vendor advisory |
http://www.freewebs.com/roozbeh_afrasiabi/xploit/execute.htm | exploit |
http://www.securityfocus.com/bid/10363 | vdb entry |
http://www.osvdb.org/6221 | vdb entry exploit |
http://archives.neohapsis.com/archives/bugtraq/2004-05/0168.html | vendor advisory mailing list exploit |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-015 | vendor advisory |