Automated Workaround for Windows Shell Flaw Released

Microsoft has added an automated means to address a zero-day Windows Shell vulnerability described in a security advisory released late last week.

Currently, there is no patch for the vulnerability, which is associated with a flawed mechanism in Windows Shell that incorrectly parses shortcuts, allowing corrupt code to execute. Instead, IT pros can disable the shortcuts in Windows by implementing a workaround. They can follow the steps manually or use the newly released "Fix it" solution, which automates the workaround.

The Fix it workaround, which "disables .LNK and .PIF file functionality," can be found in this new Knowledge Base article, released Tuesday. The workaround applies to Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2 environments.

Windows Shell is a key graphic interface component for the Windows start menu and welcome screen processes. It works with .LNK files to create shortcut icons enabling quick access to program files. Exploits can be unknowingly triggered when users click on "specially crafted shortcut" icons located on a removable USB drive.

The Fix it workaround "disables icons from being displayed for shortcuts and can help prevent attacks attempting to exploit this vulnerability," according to Microsoft.

'Stuxnet' Worm Connection
The Windows Shell problem is associated with "Stuxnet," a malicious worm variant. The Stuxnet family of malware has the ability propagate and infect new machines by infecting any USB drive connected to an infected OS.

Attacks were earlier reported in Iran. However, another incident has popped up, with Siemens reporting that an unidentified German company has been hit. The attack affected supervisory control and data acquisition (SCADA) software sitting on a Windows OS, according to Siemens.

Siemens issued an advisory Monday concerning two of its software products used in industrial processes, stating that "malware is currently spreading through a security breach in the Microsoft Windows operating system in connection with the database system of SIMATIC WinCC and SIMATIC PCS 7." Siemens added that it is working with Microsoft to find a solution at the operating system level.

The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) also confirmed that the malware has attacked Siemens' software and attributed the discovery of the flaw to VirusBlokAda, a Belarus-based antivirus vendor. ICS-CERT issued an advisory (PDF) confirming that the Stuxnet worm attempts to access databases using the affected Siemens software. It's unknown to what degree the worm has generally affected control systems, according to ICS-CERT.

"There appears to be quite a bit of knowledge regarding Stuxnet," said Tyler Reguly, senior research engineer at nCircle. "We understand how it propagates, what it targets, etc. In my opinion, it's just another piece of malware, but it's scarier because it's targeting SCADA software using a Microsoft zero-day exploit."

For its part, Microsoft said that it had logged infection attempts by Stuxnet in the United States, Indonesia, India, and Iran. Security vendor Symantec is now logging about "9,000 infection attempts per day."

No Patch for Now
Reguly and other security experts, such as Jason Miller of Shavlik Technologies, don't think there will be an out-of-band patch for the flaw before next month. Microsoft will probably wait until the regular update cycle in August, Miller said in a recent blog post. Reguly suggested a delay might occur because "Microsoft still has to ensure that the patch will not break anything else and will be interoperable with other software."

Since the security advisory appeared late last week, IT experts have expected more malware variants exploiting the Windows Shell hole to crop up while Microsoft readies a patch.

Those IT organizations still using Windows XP Service Pack 2 or Windows 2000 will be out of luck should a patch be issued. Those operating systems lost security update support as of July 13. The remedy is to upgrade to a supported operating system, or, barring that, contact Microsoft for paid "custom support."

A Microsoft spokesperson did not provide the numbers, but estimated that most United States   governmental organizations have already migrated to a supported Windows OS.

"While we believe that exposure to our Federal customers is very minimal since most, if not all, have upgraded to at least XP SP3, we would advise that customers verify whether they are still running XP SP2 or earlier Windows versions and apply the advisory as noted," the Microsoft spokesperson explained via e-mail.

About the Author

Jabulani Leffall is an award-winning journalist whose work has appeared in the Financial Times of London, Investor's Business Daily, The Economist and CFO Magazine, among others.

Featured

  • glowing digital brain-shaped neural network surrounded by charts, graphs, and data visualizations

    Google Launches Advanced AI Model for Complex Reasoning Tasks

    Google has introduced Gemini 2.5 Deep Think, an advanced artificial intelligence model designed for complex reasoning tasks.

  • teacher writing on whiteboard in office

    It's Never Too Early to Plan for Back-to-School

    School's out for summer, but teacher planning and purchasing for the upcoming year has only just begun.

  • red brick school building with a large yellow "AI" sign above its main entrance

    New National Academy for AI Instruction to Provide Free AI Training for Educators

    In an effort to "transform how artificial intelligence is taught and integrated into classrooms across the United States," the American Federation of Teachers (AFT), in partnership with Microsoft, OpenAI, Anthropic, and the United Federation of Teachers, is launching the National Academy for AI Instruction, a $23 million initiative that will provide access to free AI training and curriculum for all AFT members, beginning with K-12 educators.

  • magnifying glass highlighting a human profile silhouette, set over a collage of framed icons including landscapes, charts, and education symbols

    New AI Detector Identifies AI-Generated Multimedia Content

    Amazon Web Services and DeepBrain AI have launched AI Detector, an enterprise-grade solution designed to identify and manage AI-generated content across multiple media types. The collaboration targets organizations in government, finance, media, law, and education sectors that need to validate content authenticity at scale.