Guest BSchwarz Posted November 8, 2011 Posted November 8, 2011 Severity Rating: Important Revision Note: V1.0 (November 8, 2011): Bulletin published. Summary: This security update resolves a privately reported vulnerability in Microsoft Windows. The vulnerability could allow remote code execution if a user opens a legitimate file (such as an .eml or .wcinv file) that is located in the same network directory as a specially crafted dynamic link library (DLL) file. Then, while opening the legitimate file, Windows Mail or Windows Meeting Space could attempt to load the DLL file and execute any code it contained. For an attack to be successful, a user must visit an untrusted remote file system location or WebDAV share and open a legitimate file (such as an .eml or .wcinv file) from this location that is then loaded by a vulnerable application. Read Bulletin Quote
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.