{"id":12080,"date":"2010-08-02T13:30:37","date_gmt":"2010-08-02T12:30:37","guid":{"rendered":"http:\/\/onsoftware.en.softonic.com\/microsoft-rushes-out-shortcut-vulnerability-patch\/"},"modified":"2025-07-02T02:11:57","modified_gmt":"2025-07-02T09:11:57","slug":"microsoft-rushes-out-shortcut-vulnerability-patch","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/en\/microsoft-rushes-out-shortcut-vulnerability-patch\/","title":{"rendered":"Microsoft rushes out shortcut vulnerability patch"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/articles-images.sftcdn.net\/wp-content\/uploads\/sites\/3\/2010\/08\/windows2.png\" alt=\"windowslogo.png\" align=\"left\" \/><strong>Microsoft<\/strong> is expected to rush-out a <strong>security patch<\/strong> later today that addresses a security hole caused by shortcuts or <strong>.lnk files<\/strong>. The security threat means that cyber-criminals or hackers could use shortcuts on your desktop or elsewhere on your PC to take over your machine.<\/p>\n<p>The patch will be issued via Windows Live Update automatically, or you can download it directly from the Microsoft website. <a href=\"http:\/\/www.telegraph.co.uk\/technology\/microsoft\/7921882\/Microsoft-to-patch-Windows-shortcut-vulnerability.html\">The Telegraph reports<\/a> that Microsoft claim there has been a surge in hackers trying to exploit the vulnerability since mid July when it was initially discovered:<\/p>\n<blockquote><p>&#8220;We\u2019re able to confirm that, in the past few days, we\u2019ve seen an increase in attempts to exploit the vulnerability,\u201d said Christopher Budd, a senior security response manager at Microsoft. \u201cWe firmly believe that releasing the update out-of-band is the best thing to do to help protect our customers.\u201d<\/p><\/blockquote>\n<p><a href=\"http:\/\/www.bbc.co.uk\/news\/technology-10837232\">According the the BBC<\/a>, the flaw allows hackers to embed malicious code into shortcuts which triggers the code when opened. Most worryingly, it seems hackers have been targeting power installation with it:<\/p>\n<blockquote><p>The first exploits of the flaw were seeded via infected USB drives and network connections. While exploitation of the flaw was limited initially, the tempo of attacks via the bug have escalated since it was discovered and publicised. Early attacks using the bug were aimed at the software control systems for critical infrastructure such as power stations.<\/p><\/blockquote>\n<p>Microsoft <a href=\"http:\/\/www.microsoft.com\/technet\/security\/advisory\/2286198.mspx\">issued an alert<\/a> about the problem on July 16 and have <a href=\"http:\/\/support.microsoft.com\/kb\/2286198\">published a work around solution<\/a> for those that want to take precautions before the patch is automatically applied.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft is expected to rush-out a security patch later today that addresses a security hole caused by shortcuts or .lnk files. The security threat means that cyber-criminals or hackers could use shortcuts on your desktop or elsewhere on your PC to take over your machine. The patch will be issued via Windows Live Update automatically, &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/en\/microsoft-rushes-out-shortcut-vulnerability-patch\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Microsoft rushes out shortcut vulnerability patch&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2009,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[],"tags":[],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-12080","post","type-post","status-publish","format-standard","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/12080","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/users\/2009"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/comments?post=12080"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/12080\/revisions"}],"predecessor-version":[{"id":334838,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/posts\/12080\/revisions\/334838"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/media?parent=12080"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/categories?post=12080"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/tags?post=12080"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/usertag?post=12080"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/vertical?post=12080"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/en\/wp-json\/wp\/v2\/content-category?post=12080"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}