Vulnerabilities > CVE-2004-1049 - Unspecified vulnerability in Microsoft products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN microsoft
nessus
Summary
Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 9 |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS05-002.NASL |
description | The remote host contains a version of the Windows kernel that is affected by a security flaw in the way that cursors and icons are handled. An attacker may be able to execute arbitrary code on the remote host by constructing a malicious web page and entice a victim to visit this web page. An attacker may send a malicious email to the victim to exploit this flaw too. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 16124 |
published | 2005-01-11 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/16124 |
title | MS05-002: Cursor and Icon Format Handling Code Execution (891711) |
code |
|
Oval
accepted 2011-05-16T04:02:40.130-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Jeff Cheng organization Opsware, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." family windows id oval:org.mitre.oval:def:2956 status accepted submitted 2005-01-14T12:00:00.000-04:00 title LoadImage Cursor and Icon Format Handling Vulnerability (XP) version 70 accepted 2008-03-24T04:00:26.990-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Jeff Cheng organization Opsware, Inc. name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." family windows id oval:org.mitre.oval:def:3097 status accepted submitted 2005-01-14T12:00:00.000-04:00 title LoadImage Cursor and Icon Format Handling Vulnerability (Terminal Server) version 73 accepted 2007-11-13T12:01:12.066-05:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Jeff Cheng organization Opsware, Inc.
description Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." family windows id oval:org.mitre.oval:def:3220 status accepted submitted 2005-01-14T12:00:00.000-04:00 title LoadImage Cursor and Icon Format Handling Vulnerability (Server 2003) version 67 accepted 2008-03-24T04:00:28.971-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name John Hoyland organization Centennial Software name Jeff Cheng organization Opsware, Inc. name Jonathan Baker organization The MITRE Corporation
definition_extensions comment Microsoft Windows NT is installed oval oval:org.mitre.oval:def:36 description Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." family windows id oval:org.mitre.oval:def:3355 status accepted submitted 2005-01-14T12:00:00.000-04:00 title LoadImage Cursor and Icon Format Handling Vulnerability (NT 4.0) version 74 accepted 2011-05-16T04:03:02.877-04:00 class vulnerability contributors name Christine Walzer organization The MITRE Corporation name Andrew Buttner organization The MITRE Corporation name Jeff Cheng organization Opsware, Inc. name Shane Shaffer organization G2, Inc. name Sudhir Gandhe organization Telos name Shane Shaffer organization G2, Inc.
description Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability." family windows id oval:org.mitre.oval:def:4671 status accepted submitted 2005-01-14T12:00:00.000-04:00 title LoadImage Cursor and Icon Format Handling Vulnerability (Windows 2000) version 72
Saint
bid | 12233 |
description | Windows Cursor and Icon handling vulnerability |
id | win_patch_cursor |
osvdb | 12842 |
title | windows_cursor_icon |
type | client |
Seebug
bulletinFamily exploit description No description provided by source. id SSV:8979 last seen 2017-11-19 modified 2008-07-07 published 2008-07-07 reporter Root source https://www.seebug.org/vuldb/ssvid-8979 title MS Internet Explorer .ANI files handling Downloader Exploit (MS05-002) bulletinFamily exploit description No description provided by source. id SSV:8977 last seen 2017-11-19 modified 2008-07-07 published 2008-07-07 reporter Root source https://www.seebug.org/vuldb/ssvid-8977 title MS Internet Explorer .ANI files handling Universal Exploit (MS05-002)
References
- http://www.xfocus.net/flashsky/icoExp/index.html
- http://www.us-cert.gov/cas/techalerts/TA05-012A.html
- http://www.kb.cert.org/vuls/id/625856
- http://www.ciac.org/ciac/bulletins/p-094.shtml
- http://www.securityfocus.com/bid/12095
- http://www.osvdb.org/12623
- http://securitytracker.com/id?1012684
- http://secunia.com/advisories/13645
- http://marc.info/?l=bugtraq&m=110382891718076&w=2
- https://exchange.xforce.ibmcloud.com/vulnerabilities/18668
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4671
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3355
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3220
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3097
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2956
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002