Английская Википедия:CPLINK

Материал из Онлайн справочника
Версия от 15:13, 13 февраля 2024; EducationBot (обсуждение | вклад) (Новая страница: «{{Английская Википедия/Панель перехода}} {{Short description|Microsoft Windows shortcut icon vulnerability}} '''CPLINK''' and '''Win32/CplLnk.A''' are names for a Microsoft Windows shortcut icon vulnerability discovered in June 2010 and patched on 2 August<ref>{{cite web|url=https://technet.microsoft.com/en-us/security/bulletin/MS10-046|title=Microsoft Secu...»)
(разн.) ← Предыдущая версия | Текущая версия (разн.) | Следующая версия → (разн.)
Перейти к навигацииПерейти к поиску

Шаблон:Short description CPLINK and Win32/CplLnk.A are names for a Microsoft Windows shortcut icon vulnerability discovered in June 2010 and patched on 2 August[1][2] that affected all Windows operating systems. The vulnerability is exploitable when any Windows application that display shortcut icons, such as Windows Explorer,[3] browses to a folder containing a malicious shortcut.[4] The exploit can be triggered without any user interaction, regardless where the shortcut file is located.[4][5]

In June 2010, VirusBlokAda reported detection of zero-day attack malware called Stuxnet that exploited the vulnerability to install a rootkit that snooped Siemens' SCADA systems WinCC[6] and PCS 7.[7] According to Symantec it is the first worm designed to reprogram industrial systems and not only to spy on them.[8]

References

Шаблон:Reflist

External links