RULE(RULE ID:309752)

Rule General Information
Release Date: 2015-01-26
Rule Name: Microsoft Windows ANI File Parsing Buffer Overflow Vulnerability -4 (CVE-2004-1049)
Severity:
CVE ID:
Rule Protection Details
Description: Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."
Impact: A buffer overflow vulnerability can be triggered by an attacker in the context of the vulnerable product. Further attacks include arbitrary code execution and denial of service.
Affected OS: Windows
Reference: MicrosoftSecurityBulletin:ms05-002
SecurityFocusBID:12095
Solutions
Microsoft has released a patch MS05-002 to eliminate the vulnerability. The patch can be downloaded at http://www.microsoft.com/technet/Security/bulletin/ms05-002.mspx