Used Windows XP Help and Support Center Vulnerability Patch for Windows? Share your experience and help other users.
Developer’s Description
An attacker could exploit the vulnerability by constructing a Web page that, when opened, would call the errant function and supply the name of an existing file or folder as the argument. The attempt to upload the file or folder would fail, but the file nevertheless would be deleted. The page could be hosted on a Web site in order to attack users visiting the site, or it could be sent as an HTML mail in order to attack the recipient when it was opened.
Note: Customers should install Windows XP Service Pack 1 as a first option, and install the patch only as an interim measure.
For more information regarding this patch, click here.
Used Windows XP Help and Support Center Vulnerability Patch for Windows? Share your experience and help other users.