Описание
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2002-0070
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-014
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A147
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18
- http://marc.info/?l=bugtraq&m=101594127017290&w=2
- http://www.iss.net/security_center/static/8384.php
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0203&L=ntbugtraq&F=P&S=&P=2404
- http://www.securityfocus.com/bid/4248
Связанные уязвимости
nvd
почти 24 года назад
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.