MS KB2286198: Windows Shell Shortcut Icon Parsing Arbitrary Code Execution (EASYHOOKUP)

This script is Copyright (C) 2010-2017 Tenable Network Security, Inc.


Synopsis :

It may be possible to execute arbitrary code on the remote Windows
host using a malicious shortcut file.

Description :

Windows Shell does not properly validate the parameters of a shortcut
file when loading its icon. Attempting to parse the icon of a
specially crafted shortcut file can result in arbitrary code
execution. A remote attacker could exploit this by tricking a user
into viewing a malicious shortcut file via Windows Explorer, or any
other application that parses the shortcut's icon. This can also be
exploited by an attacker who tricks a user into inserting removable
media containing a malicious shortcut (e.g. CD, USB drive), and
AutoPlay is enabled.

EASYHOOKUP is one of multiple Equation Group vulnerabilities and
exploits disclosed on 2017/04/14 by a group known as the Shadow
Brokers.

See also :

http://technet.microsoft.com/en-us/security/advisory/2286198
http://technet.microsoft.com/en-us/security/bulletin/MS10-046

Solution :

Either apply the MS10-046 patch or disable the displaying of shortcut
icons (refer to the Microsoft advisory).

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:H/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 47750 ()

Bugtraq ID: 41732

CVE ID: CVE-2010-2568

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now