The Windows Shell is responsible for providing the basic framework of the Windows user interface experience. It is most familiar to users as the Windows Desktop, but also provides a variety of other functions to help define the user's computing session, including organizing files and folders, and providing the means to start applications. An unchecked buffer exists in one of the functions used by the Windows Shell to extract custom attribute information from audio files. A security vulnerability results because it is possible for a malicious user to mount a buffer overrun attack and attempt to exploit this flaw. An attacker could seek to exploit this vulnerability by creating an MP3 or a WMA file that contains a corrupt custom attribute and then host it on a Web site or on a network share, or send it via an HTML e-mail. If a user were to hover his or her mouse pointer over the icon for the file (either on a Web page or on the local disk), or open the shared folder where the file is stored, the vulnerable code would be invoked. An HTML e-mail could cause the vulnerable code to be invoked when a user opens or previews the e-mail. A successful attack could have the effect of either causing the Windows Shell to fail, or causing an attacker's code to run on the user's computer in the security context of the user. For more information about the vulnerabilities this update addresses, read the associated Microsoft Security Bulletin.
||Windows XP 32-bit