|
|||
Rule General Information |
---|
Release Date: | 2019-12-25 | |
Rule Name: | Microsoft Windows Crafted Animated Cursor Handling Buffer Overflow Vulnerability (CVE-2007-0038) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks includes arbitrary code execution and denial of service. | |
Affected OS: | Windows, Others | |
Reference: | MicrosoftSecurityBulletin:ms07-017 http://archives.neohapsis.com/archives/fulldisclosure/2007-03/0470.html http://securityreason.com/securityalert/2542 http://www.determina.com/security_center/security_advisories/securityadvisory_0day_032907.asp |
|
Solutions |
---|
Microsoft has released a patch MS07-017 to eliminate the vulnerability. The patch can be downloaded at http://www.microsoft.com/technet/security/Bulletin/ms07-017.mspx |