CVE-2015-0096

EXPLOITED

Microsoft Windows Shell LNK Code Execution

Title source: metasploit

Description

Untrusted search path vulnerability in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to gain privileges via a Trojan horse DLL in the current working directory, leading to DLL loading during Windows Explorer access to the icon of a crafted shortcut, aka "DLL Planting Remote Code Execution Vulnerability."

Exploits (5)

exploitdb WORKING POC VERIFIED
by Ivanlef0u · textlocalwindows
https://www.exploit-db.com/exploits/14403
metasploit WORKING POC EXCELLENT
by Michael Heerklotz, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/smb/ms15_020_shortcut_icon_dllloader.rb
metasploit WORKING POC GREAT
by Uncredited, Yorick Koster, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2017_8464_lnk_lpe.rb
metasploit WORKING POC GREAT
by Uncredited, Yorick Koster, Spencer McIntyre · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/cve_2017_8464_lnk_rce.rb
metasploit WORKING POC EXCELLENT
by Michael Heerklotz, juan vazquez · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/ms15_020_shortcut_icon_dllloader.rb

Scores

EPSS 0.8707
EPSS Percentile 99.4%

Details

VulnCheck KEV 2021-12-15
CWE
CWE-426
Status published
Products (11)
microsoft/windows_7
microsoft/windows_8
microsoft/windows_8.1
microsoft/windows_rt
microsoft/windows_rt_8.1
microsoft/windows_server_2003
microsoft/windows_server_2008
microsoft/windows_server_2008 r2 sp1 (2 CPE variants)
microsoft/windows_server_2012
microsoft/windows_server_2012 r2
... and 1 more
Published Mar 11, 2015
Tracked Since Feb 18, 2026