| VID |
26110 |
| Severity |
40 |
| Port |
139,445 |
| Protocol |
TCP |
| Class |
SMB |
| Detailed Description |
The Hotfix(KB891711) for 'Vulnerability in Cursor and Icon Format Handling' has not been applied. This update resolves several newly-discovered, privately reported and public vulnerabilities. An attacker who successfully exploited the most severe of these vulnerabilities described below could take complete control of an affected system:
1. Windows Kernel Vulnerability1: A denial of service vulnerability exists in the ANI (animated cursor files) file header handling routines contained in the 'user32.dll' library. 2. Cursor and Icon Format Handling Vulnerability: A remote code execution vulnerability exists in the 'LoadImage' function of the 'user32.dll' library. 3. Windows Kernel Vulnerability2: A stack-based buffer overflow vulnerability exists in the ANI (animated cursor files) file header handling routines contained in the 'user32.dll' library.
* Note: This check requires an account with Guest or upper privileges which can access the registry of the remote host to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.
* References: http://www.microsoft.com/technet/security/bulletin/ms05-002.mspx http://www.kb.cert.org/vuls/id/177584 http://www.kb.cert.org/vuls/id/697136 http://packetstormsecurity.nl/0412-exploits/ANI-DoS.txt http://www.xfocus.net/flashsky/icoExp/index.html http://www.securityfocus.com/advisories/7814 http://www.securityfocus.com/archive/1/386756 http://www.securityfocus.com/archive/1/386961
* Platforms Affected: Microsoft Windows 98, Me Microsoft Windows NT Any version SP6a Microsoft Windows 2000 Any version SP4 Microsoft Windows XP Any version SP1 Microsoft Windows XP 64-Bit Edition SP1 Microsoft Windows XP 64-Bit Edition Version 2003 Microsoft Windows Server 2003 Any version |
| Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin MS05-002 at http://www.microsoft.com/technet/security/bulletin/ms05-002.mspx
-- OR --
Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com . Windows Update detects what version of Windows you are running and offers the appropriate patch. |
| Related URL |
CVE-2004-0567,CVE-2004-1080 (CVE) |
| Related URL |
11763,11922 (SecurityFocus) |
| Related URL |
18258,18259 (ISS) |
|