|
|||
Rule General Information |
---|
Release Date: | 2015-01-26 | |
Rule Name: | Microsoft Windows ANI File Parsing Buffer Overflow Vulnerability -4 (CVE-2004-1049) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." | |
Impact: | A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service. | |
Affected OS: | Windows | |
Reference: | MicrosoftSecurityBulletin:ms05-002 SecurityFocusBID:12095 |
|
Solutions |
---|
Microsoft has released a patch MS05-002 to eliminate the vulnerability. The patch can be downloaded at http://www.microsoft.com/technet/Security/bulletin/ms05-002.mspx |