Описание
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-0070
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-014
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A147
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18
- http://marc.info/?l=bugtraq&m=101594127017290&w=2
- http://www.iss.net/security_center/static/8384.php
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0203&L=ntbugtraq&F=P&S=&P=2404
- http://www.securityfocus.com/bid/4248
Связанные уязвимости
nvd
около 24 лет назад
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.