SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (Microsoft)  >   Windows DLL (Any) Vendors:   Microsoft
Microsoft Windows Animated Cursor Bug Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017827
SecurityTracker URL:  http://securitytracker.com/id/1017827
CVE Reference:   CVE-2007-0038   (Links to External Site)
Updated:  Apr 6 2007
Original Entry Date:  Mar 29 2007
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 2000 SP4, 2003 SP2, XP SP2, Vista
Description:   A vulnerability was reported in Microsoft Windows in the processing of animated cursor files. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted file that, when loaded by the target user, will trigger a buffer overflow and execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

This can be exploited via various methods, including HTML and e-mail and is not limited to files with a '.ani' file extension.

Cursors, animated cursors, and icons are potential attack vectors.

This can be exploited via various applications that use the vulnerable Windows functions, including Microsoft Internet Explorer, Windows Explorer, Mozilla Firefox, and Microsoft Outlook.

Users with Internet Explorer 7 running in Protected Mode on Windows Vista are not affected.

Determina Security Research discovered this vulnerability.

The vendor was notified on December 20, 2006.

The Determina advisory is available at:

http://www.determina.com/security_center/security_advisories/securityadvisory_0day_032907.asp

McAfee reported that this vulnerability is being actively exploited.

The McAfee advisory is available at:

http://www.avertlabs.com/research/blog/?p=230

Impact:   A remote user can create HTML or a file that, when loaded by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued the following fixes:

Microsoft Windows 2000 Service Pack 4:

http://www.microsoft.com/downloads/details.aspx?FamilyId=92F20599-3E7B-4217-91E6-FDCFB4C56856

Microsoft Windows XP Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=F82EA184-945F-4B78-9463-10AC20A75020

Microsoft Windows XP Professional x64 Edition and Microsoft Windows XP Professional x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=EA5E1B87-4DB5-4B1A-891E-29C6BD6C0184

Microsoft Windows Server 2003, Microsoft Windows Server 2003 Service Pack 1, and Microsoft Windows Server 2003 Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=9F73A782-DEAF-46E0-B3E0-79042FF39979

Microsoft Windows Server 2003 for Itanium-based Systems, Microsoft Windows Server 2003 with SP1 for Itanium-based Systems, and Microsoft Windows Server 2003 with SP2 for Itanium-based Systems:

http://www.microsoft.com/downloads/details.aspx?FamilyId=7BA63879-4FC7-4A5C-B9B5-F98C5CDC6840

Microsoft Windows Server 2003 x64 Edition and Microsoft Windows Server 2003 x64 Edition Service Pack 2:

http://www.microsoft.com/downloads/details.aspx?FamilyId=3276DD11-4E2F-4183-A542-82AC3C6D9754

Windows Vista:

http://www.microsoft.com/downloads/details.aspx?FamilyId=D8B0E65C-5B41-46EB-92DF-0B062CFCDEEC

Windows Vista x64 Edition:

http://www.microsoft.com/downloads/details.aspx?FamilyId=FB0FF2B5-05FE-4158-B4B7-DA0D7F82C04B

A restart is required.

The MS07-017 patch may cause some third-party applications to fail to start on Windows XP. A hotfix is available for this problem, as described in the following knowledge base article:

http://support.microsoft.com/kb/935448/

The Microsoft advisory is available at:

http://www.microsoft.com/technet/security/bulletin/ms07-017.mspx

Vendor URL:  www.microsoft.com/technet/security/bulletin/ms07-017.mspx (Links to External Site)
Cause:   Boundary error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Wed, 28 Mar 2007 23:11:47 -0500
Subject:  Internet Explorer (IE)


0day

http://www.avertlabs.com/research/blog/?p=230


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC