Vulnerabilities > CVE-2007-1765
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing cursors, animated cursors, and icons, a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this issue might be a duplicate of CVE-2007-0038; if so, then use CVE-2007-0038 instead of this identifier.
Vulnerable Configurations
Exploit-Db
description MS Windows Animated Cursor (.ANI) Remote Exploit (eeye patch bypass). CVE-2007-0038,CVE-2007-1765. Remote exploit for windows platform id EDB-ID:3636 last seen 2016-01-31 modified 2007-04-01 published 2007-04-01 reporter jamikazu source https://www.exploit-db.com/download/3636/ title Microsoft Windows - Animated Cursor .ANI Remote Exploit eeye patch bypass description MS Windows Animated Cursor (.ANI) Overflow Exploit (Hardware DEP). CVE-2007-0038,CVE-2007-1765. Local exploit for windows platform id EDB-ID:3652 last seen 2016-01-31 modified 2007-04-03 published 2007-04-03 reporter devcode source https://www.exploit-db.com/download/3652/ title Microsoft Windows - Animated Cursor .ANI Overflow Exploit Hardware DEP description MS Windows XP Animated Cursor (.ANI) Remote Overflow Exploit 2. CVE-2007-0038,CVE-2007-1765. Remote exploit for windows platform id EDB-ID:3635 last seen 2016-01-31 modified 2007-04-01 published 2007-04-01 reporter Trirat Puttaraksa source https://www.exploit-db.com/download/3635/ title Microsoft Windows XP - Animated Cursor .ANI Remote Overflow Exploit 2 description MS Windows XP/Vista Animated Cursor (.ANI) Remote Overflow Exploit. CVE-2007-0038,CVE-2007-1765. Remote exploit for windows platform file exploits/windows/remote/3634.txt id EDB-ID:3634 last seen 2016-01-31 modified 2007-04-01 platform windows port published 2007-04-01 reporter jamikazu source https://www.exploit-db.com/download/3634/ title Microsoft Windows XP/Vista - Animated Cursor .ANI Remote Overflow Exploit type remote description MS Windows Animated Cursor (.ANI) Stack Overflow Exploit. CVE-2007-0038,CVE-2007-1765. Local exploit for windows platform id EDB-ID:3617 last seen 2016-01-31 modified 2007-03-31 published 2007-03-31 reporter devcode source https://www.exploit-db.com/download/3617/ title Microsoft Windows - Animated Cursor .ANI Stack Overflow Exploit description Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (SMTP). CVE-2007-0038,CVE-2007-1765. Remote exploit for windows platform id EDB-ID:16698 last seen 2016-02-02 modified 2010-09-20 published 2010-09-20 reporter metasploit source https://www.exploit-db.com/download/16698/ title Windows ANI LoadAniIcon Chunk Size Stack Buffer Overflow SMTP
Metasploit
description | This module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee. |
id | MSF:EXPLOIT/WINDOWS/EMAIL/MS07_017_ANI_LOADIMAGE_CHUNKSIZE |
last seen | 2020-06-14 |
modified | 2019-05-23 |
published | 2010-07-25 |
references | |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/email/ms07_017_ani_loadimage_chunksize.rb |
title | Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (SMTP) |
Nessus
NASL family | Windows : Microsoft Bulletins |
NASL id | SMB_NT_MS07-017.NASL |
description | The remote host is running a version of Windows with a bug in the Animated Cursor (ANI) handling routine that could allow an attacker to execute arbitrary code on the remote host by sending a specially crafted email or by luring a user on the remote host into visiting a rogue web site. Additionally, the system is vulnerable to : - Local Privilege Elevation (GDI, EMF, Font Rasterizer) - Denial of Service (WMF) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24911 |
published | 2007-04-03 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24911 |
title | MS07-017: Vulnerabilities in GDI Could Allow Remote Code Execution (925902) |
code |
|
Packetstorm
data source https://packetstormsecurity.com/files/download/55551/ani_loadimage_chunksize-browser.rb.txt id PACKETSTORM:55551 last seen 2016-12-05 published 2007-04-03 reporter Matt Miller source https://packetstormsecurity.com/files/55551/ani_loadimage_chunksize-browser.rb.txt.html title ani_loadimage_chunksize-browser.rb.txt data source https://packetstormsecurity.com/files/download/55661/devcode2.txt id PACKETSTORM:55661 last seen 2016-12-05 published 2007-04-05 reporter devcode source https://packetstormsecurity.com/files/55661/devcode2.txt.html title devcode2.txt data source https://packetstormsecurity.com/files/download/83052/ani_loadimage_chunksize.rb.txt id PACKETSTORM:83052 last seen 2016-12-05 published 2009-11-26 reporter H D Moore source https://packetstormsecurity.com/files/83052/Windows-ANI-LoadAniIcon-Chunk-Size-Stack-Overflow-SMTP.html title Windows ANI LoadAniIcon() Chunk Size Stack Overflow (SMTP) data source https://packetstormsecurity.com/files/download/55512/devcode.txt id PACKETSTORM:55512 last seen 2016-12-05 published 2007-04-02 reporter devcode source https://packetstormsecurity.com/files/55512/devcode.txt.html title devcode.txt data source https://packetstormsecurity.com/files/download/55552/ani_loadimage_chunksize-email.rb.txt id PACKETSTORM:55552 last seen 2016-12-05 published 2007-04-03 reporter Matt Miller source https://packetstormsecurity.com/files/55552/ani_loadimage_chunksize-email.rb.txt.html title ani_loadimage_chunksize-email.rb.txt
Saint
bid | 23194 |
description | Windows Animated Cursor Header buffer overflow |
id | win_patch_gdi07017 |
osvdb | 33629 |
title | windows_animated_cursor |
type | client |
Seebug
bulletinFamily exploit description No description provided by source. id SSV:6614 last seen 2017-11-19 modified 2007-04-10 published 2007-04-10 reporter Root source https://www.seebug.org/vuldb/ssvid-6614 title MS Windows Animated Cursor (.ANI) Overflow Exploit (Hardware DEP) bulletinFamily exploit description No description provided by source. id SSV:6535 last seen 2017-11-19 modified 2007-04-02 published 2007-04-02 reporter Root source https://www.seebug.org/vuldb/ssvid-6535 title MS Windows Animated Cursor (.ANI) Stack Overflow Exploit bulletinFamily exploit description No description provided by source. id SSV:14192 last seen 2017-11-19 modified 2007-03-31 published 2007-03-31 reporter Root source https://www.seebug.org/vuldb/ssvid-14192 title MS Windows Animated Cursor (.ANI) Stack Overflow Exploit
References
- http://vil.nai.com/vil/content/v_141860.htm
- http://www.avertlabs.com/research/blog/?p=230
- http://www.avertlabs.com/research/blog/?p=233
- http://www.microsoft.com/technet/security/advisory/935423.mspx
- http://www.securityfocus.com/bid/23194
- http://www.securitytracker.com/id?1017827
- http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/
- http://research.eeye.com/html/alerts/zeroday/20070328.html
- http://www.vupen.com/english/advisories/2007/1151
- http://www.securityfocus.com/archive/1/464345/100/0/threaded
- http://www.securityfocus.com/archive/1/464287/100/0/threaded