Zero-Day Advisory
Fortinet Discovers Microsoft Windows LNK Heap Memory Corruption
Summary
Fortinet's FortiGuard Labs has discovered heap memory corruption vulnerability on Microsoft Windows Storage API library that is used to process Microsoft Windows LNK files.
Microsoft Windows LNK files operate as Windows Explorer extensions, rather than file system extensions. As a shell extension, .lnk files cannot be used in place of the file except in Windows Explorer, and have other uses in Windows Explorer in addition to use as a shortcut to a local file (or GUID)
The vulnerability in the Microsoft Windows Storage API library allows remote code execution when the victim open a specially crafted Windows LNK files.
Solutions
Users should apply the solution provided by Microsoft.
Timeline
Fortinet reported the vulnerability to Microsoft on November 06, 2019
Microsoft confirmed the vulnerability on November 14, 2019
Microsoft released patch for the vulnerability on March 11, 2020
References
Acknowledgement
This vulnerability was discovered by Wayne Low of Fortinet's FortiGuard Labs.