Microsoft Windows LNK Shortcut Automatic File Execution Exploit

Microsoft Windows is prone to a vulnerability that may allow a file to automatically run because the software fails to handle 'LNK' files properly. Specifically, the issue occurs when loading the icon of a shortcut file. A specially crafted 'LNK' file can cause Windows to automatically execute code that is specified by the shortcut file. This vulnerability is currently being exploited in the wild. This update provides two modules: one of them can be used to exploit this vulnerability via an USB drive, and the other one provides a typical IMPACT client-side attack via email. WARNING: This is an early release module. This is not the final version of this module. It is a pre-released version in order to deliver a module as quickly as possible to our customers that may be useful in some situations. Since this module is not the final version it may contain bugs or have limited functionality and may not have complete or accurate documentation.
Exploit type: 
Vulnerabilty ID: 
Released Date: 
Monday, July 19, 2010 - 19:00