Used Microsoft Windows XP (32-bit) Unchecked Buffer Vulnerability Patch for Windows?
Developer’s Description
An unchecked buffer exists in one of the functions used by the Windows Shell to extract custom attribute information from audio files. A security vulnerability results because it is possible for a malicious user to mount a buffer overrun attack and attempt to exploit this flaw.
An attacker could seek to exploit this vulnerability by creating an MP3 or a WMA file that contains a corrupt custom attribute and then host it on a Web site or on a network share, or send it via an HTML e-mail. If a user were to hover his or her mouse pointer over the icon for the file (either on a Web page or on the local disk), or open the shared folder where the file is stored, the vulnerable code would be invoked. An HTML e-mail could cause the vulnerable code to be invoked when a user opens or previews the e-mail. A successful attack could have the effect of either causing the Windows Shell to fail, or causing an attacker's code to run on the user's computer in the security context of the user.
For more information about the vulnerabilities this update addresses, read the associated Microsoft Security Bulletin.
Used Microsoft Windows XP (32-bit) Unchecked Buffer Vulnerability Patch for Windows?
Explore More
BizCrypto Addons for BizTalk
FreeCryptoSoft Enigma (64-bit)
Trial version
Only4urEyes
FreeSolid RSA Encryption
Trial version
USBCrypt
Trial versionInternet Scanner
Trial version
TouchLocker
Trial version
Windows 2000 Security Patch: Unchecked Buffer in ISAPI Extension Could Enable Compromise of IIS 5.0
Free
IDVAS Desktop
Trial version
Encrypted File & Direct Use
Trial versionComplete Protection System - File Protection
Trial version
Flexcrypt
Trial version