Unchecked Buffer in Windows XP Shell

Reported December 18, 2002, by Microsoft.





·         Windows XP




A vulnerability exists in the Windows XP shell that can result in the execution of code on the vulnerable system. This vulnerability stems from an unchecked buffer in a function that the Windows shell uses to extract custom attribute information from audio files. An attacker can exploit this vulnerability by creating an MP3 or Windows Media Audio (WMA) file that contains a corrupted custom attribute, then distributing the file to a vulnerable user. If a vulnerable user hovers his or her mouse pointer over the file icon (either on a Web page or on the local disk) or opens the shared folder in which the file resides, the vulnerable code is invoked.




Microsoft has released Security Bulletin MS02-072, "Unchecked Buffer in Windows Shell Could Enable System Compromise (329390)," to address this vulnerability and recommends that affected users immediately apply the appropriate patch mentioned in the bulletin.



Discovered by Foundstone.

TAGS: Security
Hide comments


  • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

Plain text

  • No HTML tags allowed.
  • Web page addresses and e-mail addresses turn into links automatically.
  • Lines and paragraphs break automatically.