[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

LoadImage Cursor and Icon Format Handling Vulnerability (XP)

ID: oval:org.mitre.oval:def:2956Date: (C)2005-01-14   (M)2021-07-09
Class: VULNERABILITYFamily: windows




Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."

Platform:
Microsoft Windows XP
Product:
Cursor and Icon Formatting
Reference:
CVE-2004-1049
CVE    1
CVE-2004-1049

© SecPod Technologies