Does the malware need payload (shellcode) to exploit this flaw?
A. Since this is a design issue, in the way how Shortcut’s are parsed, no malicious payload (shellcode) is required to exploit this flaw. The LNK file needs to point to a malicious file, the path of which needs to be hardcoded in the Shortcut file. 3. What are the requirements to successfully exploit this flaw? A. This flaw can be triggered when explorer.exe (Windows Explorer) or iexplorer.exe (Internet Explorer) tries to render a malformed .LNK file that points to a malicious executable. The user need not double click on the .LNK file to trigger the vulnerability; just opening the folder containing the malicious shortcut is enough to get infected. 4. What are the most likely attack vectors used to exploit this vulnerability? A. USB drives are likely to be affected the most. The malware discovered in the wild was exploiting this issue via USB drive. File sharing over SMB is also another likely place to exploit this flaw and this can lead to widespread malware infections over internal n