Giveaways, Technology, Smartphones, Programming and Internet


Microsoft security update to fix the Vulnerability in Windows Shell which Could Allow Remote Code Execution - Critical

Microsoft released a security update which fixes the Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198). This security updated rated critical.

This security update resolves a publicly disclosed vulnerability in Windows Shell. The vulnerability could allow remote code execution if the icon of a specially crafted shortcut is displayed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

This security update is rated Critical for all supported editions of Microsoft Windows. For more information, see the subsection, Affected and Non-Affected Software, in this section.

This security fix is for the following operating systems -

Windows XP Service Pack 3

Windows XP Professional x64 Edition Service Pack 2

Windows Server 2003 Service Pack 2

Windows Server 2003 x64 Edition Service Pack 2

Windows Server 2003 with SP2 for Itanium-based Systems

Windows Vista Service Pack 1

Windows Vista Service Pack 2

Windows Vista x64 Edition Service Pack 1

Windows Vista x64 Edition Service Pack 2

Windows Server 2008 for 32-bit Systems

Windows Server 2008 for 32-bit Systems Service Pack 2

Windows Server 2008 for x64-based Systems

Windows Server 2008 for x64-based Systems Service Pack 2

Windows Server 2008 for Itanium-based Systems

Windows Server 2008 for Itanium-based Systems Service Pack 2

Windows 7 for 32-bit Systems

Windows 7 for x64-based Systems

Windows Server 2008 R2 for x64-based Systems*

Windows Server 2008 R2 for Itanium-based Systems

You can read more and download the security update which will fix Vulnerability in Windows Shell Could Allow Remote Code Execution  from here

Related Posts

blog comments powered by Disqus