RULE(RULE ID:305007)

Rule General Information
Release Date: 2019-12-25
Rule Name: Microsoft Windows Crafted Animated Cursor Handling Buffer Overflow Vulnerability (CVE-2007-0038)
Severity:
CVE ID:
Rule Protection Details
Description: Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7.
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service.
Affected OS: Windows, Others
Reference: MicrosoftSecurityBulletin:ms07-017
http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0470.html
http://securityreason.com/securityalert/2542
http://www.determina.com/security_center/security_advisories/securityadvisory_0day_032907.asp
Solutions
Microsoft has released a patch MS07-017 to eliminate the vulnerability. The patch can be downloaded at http://www.microsoft.com/technet/security/Bulletin/ms07-017.mspx