[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253650

 
 

909

 
 

197367

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

LoadImage Cursor and Icon Format Handling Vulnerability (Terminal Server)

ID: oval:org.mitre.oval:def:3097Date: (C)2005-01-14   (M)2021-07-09
Class: VULNERABILITYFamily: windows




Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."

Platform:
Microsoft Windows NT
Product:
Cursor and Icon Formatting
Reference:
CVE-2004-1049
CVE    1
CVE-2004-1049
CPE    1
cpe:/o:microsoft:windows_nt

© SecPod Technologies