Microsoft Windows Filename Parsing Vulnerability
Last Update Date:
12 Dec 2012 14:51
Release Date:
12 Dec 2012
5448
Views
RISK: High Risk
TYPE: Operating Systems - Windows OS

A remote code execution vulnerability exists in the way that Microsoft Windows parses filenames. The vulnerability may corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user.
Impact
- Remote Code Execution
System / Technologies affected
- Windows XP
- Windows Server 2003
- Windows Vista
- Windows Server 2008
- Windows 7
- Windows Server 2008 R2
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Download location for patches:
http://technet.microsoft.com/en-us/security/bulletin/ms12-081
Vulnerability Identifier
Source
Related Link
Share with