Korean
<< Back
VID 26110
Severity 40
Port 139,445
Protocol TCP
Class SMB
Detailed Description The Hotfix(KB891711) for 'Vulnerability in Cursor and Icon Format Handling' has not been applied. This update resolves several newly-discovered, privately reported and public vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities described below could take complete control of an affected system:

1. Windows Kernel Vulnerability1: A denial of service vulnerability exists in the ANI (animated cursor files) file header handling routines contained in the 'user32.dll' library.
2. Cursor and Icon Format Handling Vulnerability: A remote code execution vulnerability exists in the 'LoadImage' function of the 'user32.dll' library.
3. Windows Kernel Vulnerability2: A stack-based buffer overflow vulnerability exists in the ANI (animated cursor files) file header handling routines contained in the 'user32.dll' library.

* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.microsoft.com/technet/security/bulletin/ms05-002.mspx
http://www.kb.cert.org/vuls/id/177584
http://www.kb.cert.org/vuls/id/697136
http://packetstormsecurity.nl/0412-exploits/ANI-DoS.txt
http://www.xfocus.net/flashsky/icoExp/index.html
http://www.securityfocus.com/advisories/7814
http://www.securityfocus.com/archive/1/386756
http://www.securityfocus.com/archive/1/386961

* Platforms Affected:
Microsoft Windows 98, Me
Microsoft Windows NT Any version SP6a
Microsoft Windows 2000 Any version SP4
Microsoft Windows XP Any version SP1
Microsoft Windows XP 64-Bit Edition SP1
Microsoft Windows XP 64-Bit Edition Version 2003
Microsoft Windows Server 2003 Any version
Recommendation Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS05-002 at http://www.microsoft.com/technet/security/bulletin/ms05-002.mspx

-- OR --

Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch.
Related URL CVE-2004-0567,CVE-2004-1080 (CVE)
Related URL 11763,11922 (SecurityFocus)
Related URL 18258,18259 (ISS)