Windows Animated Cursor Handling Vulnerability


  • Question
    How does Vital Security handle Windows Animated Cursor Handling vulnerability (http://www.microsoft.com/technet/security/advisory/935423.mspx)?

  • Answer
    Below are some details on this vulnerability (taken from http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0038):
    Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons. This is a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7.

    Finjan's customers are protected against this vulnerability through Anti-Virus engines, which are integrated into the Vital Security Web Appliance.

  • Software Version
    N/A

  • This article applies to:
    NG 1000
    NG 5000
    NG 8000
    This article was previously published as:
    Finjan KB 1493

    Last Modified 3/23/2009.
    https://support.trustwave.com/kb/KnowledgebaseArticle13350.aspx