New
#1
Thanx for the heads up
Microsoft updated Microsoft Security Advisory 2286198 to provide an automated "Fix It" solution to implement the workaround provided in the original Security Advisory release.
The Fix it disables .LNK and .PIF file functionality automatically on a computer that is running Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, or Windows Server R2.
Complete details about the Fix it solution to both enable the workaround and disable it after a security update has been released are available in Microsoft KB 2286198.
Enable Workaround
Fix this problem
Microsoft Fix it 50486
NOTE: Applying the Fix it will require a restart of the machine.
After a security update is released for this vulnerability, you can undo the changes made by the Fix it solution by using Microsoft Fix it 50487:
References:
This is like killing the baby because he messed his diaper. How would one start a program...by going to the .exe in it's directory?
No it will just Disable the displaying of icons for shortcuts
An attacker could present a removable drive to the user with a malicious shortcut file, and an associated malicious binary. When the user opens this drive in Windows Explorer, or any other application that parses the icon of the shortcut, the malicious binary will execute code of the attacker’s choice on the victim system. An attacker could also set up a malicious Web site or a remote network share and place the malicious components on this remote location. When the user browses the Web site using a Web browser such as Internet Explorer or a file manager such as Windows Explorer, Windows will attempt to load the icon of the shortcut file, and the malicious binary will be invoked. In addition, an attacker could embed an exploit in a document that supports embedded shortcuts or a hosted browser control (such as but not limited to Microsoft Office documents).Microsoft Security Advisory (2286198): Vulnerability in Windows Shell Could Allow Remote Code ExecutionImpact of workaround. Disabling icons from being displayed for shortcuts prevents the issue from being exploited on affected systems. When this workaround is implemented, the system may display most icons as a "white" default object icon, which does impact usability. We recommend that system administrators test this workaround thoroughly prior to deployment. When the workaround is undone, all icons will reappear.
Captain, where have you been? I haven't seen you around lately. Either case, good to see you.
It would have a very big impact on me, because I'm very visually oriented. I would prefer to risk having to reinstall everything, rather than install this.When this workaround is implemented, the system may display most icons as a "white" default object icon, which does impact usability.
Might be better to patch it. According to this article, MS may have a devil of a time fixing it.
Time will tell...
Windows Shortcut Bug May Be Hard to Patch
Windows Shortcut Bug May Be Hard to Patch - PCWorld
Microsoft may have a tough time fixing the Windows shortcut vulnerability, a security researcher said today.
A noted vulnerability expert, however, disagreed, and said Microsoft could deliver a patch within two weeks.
"The way Windows' shortcuts are designed is flawed, and I think they will have a very hard time patching this," said Roel Schouwenberg, an antivirus researcher with Moscow-based Kaspersky Lab.
Schouwenberg based his prediction that a patch may prove elusive on the fact that Microsoft has never faced a security issue with shortcuts, and thus has no security processes in place that it can quickly tweak."This may take them awhile to patch," said Schouwenberg. "But the wider-scale use of this is imminent."