This script is Copyright (C) 2010-2013 Tenable Network Security, Inc.
It may be possible to execute arbitrary code on the remote Windows
host using a malicious shortcut file.
Windows Shell does not properly validate the parameters of a shortcut
file when loading its icon. Attempting to parse the icon of a
specially crafted shortcut file can result in arbitrary code
A remote attacker could exploit this by tricking a user into viewing a
malicious shortcut file via Windows Explorer, or any other application
that parses the shortcut's icon. This can also be exploited by an
attacker who tricks a user into inserting removable media containing
a malicious shortcut (e.g. CD, USB drive), and AutoPlay is enabled.
See also :
Either apply the MS10-046 patch or disable the displaying of shortcut
icons (refer to the Microsoft advisory).
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true