Integer overflow in the LoadImage API of the USER32 Lib for Microsoft Windows allows remote malicious users to execute arbitrary code via a .bmp, .cur, .ico or .ani file with a large image size field, which leads to a buffer overflow, aka the "Cursor and Icon Format Handling Vulnerability."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft windows 2000 |
||
microsoft windows xp |
||
microsoft windows nt |
||
microsoft windows 2003 server r2 |