Used Microsoft Windows XP (64-bit) Unchecked Buffer Vulnerability Patch for Windows?
Developer’s Description
An unchecked buffer exists in one of the functions used by the Windows Shell to extract custom attribute information from audio files. A security vulnerability results because it is possible for a malicious user to mount a buffer overrun attack and attempt to exploit this flaw.
An attacker could seek to exploit this vulnerability by creating an MP3 or a WMA file that contains a corrupt custom attribute and then host it on a Web site or on a network share, or send it via an HTML e-mail. If a user were to hover his or her mouse pointer over the icon for the file (either on a Web page or on the local disk), or open the shared folder where the file is stored, the vulnerable code would be invoked. An HTML e-mail could cause the vulnerable code to be invoked when a user opens or previews the e-mail. A successful attack could have the effect of either causing the Windows Shell to fail, or causing an attacker's code to run on the user's computer in the security context of the user.
For more information about the vulnerabilities this update addresses, read the associated Microsoft Security Bulletin.
Used Microsoft Windows XP (64-bit) Unchecked Buffer Vulnerability Patch for Windows?
Explore More
MyRed Button
Trial versionBlowFish 2000
Trial versionEncryption Protection
Trial versionCopy Protect
Trial version
idoo Secure Disc Creator
Trial version
Whitenoise Strong Encryptor
FreeFox Password Safe
Trial versionSecure Hive
Trial versionCD Secure
Trial versionKrypter
Free
NewSID
Free
Microsoft Windows NT 4.0 Service Pack 4 Symbols High Encryption
Free