LoadImage Cursor and Icon Format Handling Vulnerability (Windows 2000)ID: oval:org.mitre.oval:def:4671 | Date: (C)2005-01-14 (M)2021-07-09 |
Class: VULNERABILITY | Family: windows |
Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote attackers to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."
Platform: |
Microsoft Windows 2000 |
Product: |
Cursor and Icon Formatting |