9.3
CVSSv2

CVE-2007-1765

Published: 30/03/2007 Updated: 23/07/2021
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 985
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote malicious users to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing cursors, animated cursors, and icons, a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this issue might be a duplicate of CVE-2007-0038; if so, then use CVE-2007-0038 instead of this identifier.

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 2000

microsoft windows 2000 -

microsoft windows 2003 server -

microsoft windows vista

microsoft windows xp

microsoft ie 7.0

avaya ip600 media servers

microsoft internet explorer

avaya definity one media server

avaya s3400

avaya s8100

Exploits

Exploit for the Microsoft Windows ANI LoadAniIcon stack overflow vulnerability (Hardware DEP) ...
Exploit for the Microsoft Windows ANI LoadAniIcon stack overflow vulnerability ...
::[ jamikazu presents ]:: Windows Animated Cursor Handling Exploit (0day) (Version3) Works on fully patched Windows Vista I think it is first real remote code execution exploit on vista =) Tested on: Windows Vista Enterprise Version 60 (Build 6000) (default installation and UAC enabled) Windows Vista Ultimate Version 60 (Build 6000) (defau ...
Microsoft ANI Buffer Overflow Exploit Author: Trirat Puttaraksa sf-freedomblogspotcom Tested on: Windows XP SP2 fully patched + IE 6 SP2 For educational purpose only There are many confuses about this vulnerability Someone said that this could not be exploited in XP SP2 - that's wrong I provide this exploit because I wanna to tell t ...
/* * version 05 * Copyright (c) 2007 devcode * * * ^^ D E V C O D E ^^ * * Windows ANI LoadAniIcon Stack Overflow For Hardware DEP XP SP2 * [CVE-2007-1765] * * * Description: * A vulnerability has been identified in Microsoft Windows, * which could be exploited by remote attackers to take complete * control of an affected system This ...
/**************************************************************************** * MS Windows Explorer Unspecified ANI File DoS * * * * * * Another Ani bug that freezes Explor ...
/*************************************************************************** * MS Windows ANI File Local Buffer Overflow * * * * * * Credits go to Trirat Puttaraksa cause hi ...
/* ANI exploit tested on Windows XP SP2 - Portuguese Shellcode port bind 13579 JMP ESP Addr - ntdlldll Greetz: Marsu, Devcode, Str0ke, Dave, Sekureorg guys, Sauna Exploit coded listen sauna hits Featuring Luiz Zanardo's gigs "Minoide - \x52\x49\x46\x ...
::[ jamikazu presents ]:: Windows Animated Cursor Handling Exploit (0day) Works on fully patched Windows Vista I think it is first real remote code execution exploit on vista =) Tested on: Windows Vista Enterprise Version 60 (Build 6000) (default installation and UAC enabled) Windows Vista Ultimate Version 60 (Build 6000) (default installa ...
#!/usr/bin/env python # # $Id: win32-loadaniiconpy 4 2007-06-02 00:47:59Z ramon $ # # Windows Animated Cursor Stack Overflow Exploit # Copyright 2007 Ramon de Carvalho Valle <ramon@risesecurityorg>, # RISE Security <contact@risesecurityorg> # # This program is free software; you can redistribute it and/or modify # it und ...
## # $Id: ms07_017_ani_loadimage_chunksizerb 10394 2010-09-20 08:06:27Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require ...
#-------------------------------------------------------------------------------- # Info: ANI (RIFF Cursors) 2007 universal exploit generator # Tested on MS Internet Explorer 6x-7x, Windows XP SP2, Windows Vista # Author: Yag Kohha <skyhole [at] gmailcom> # 10x`n`Gr33tz 2: # Jamikazu, Skylined (pretty good t-short on BH07 Europe - L00k li ...
/* * Copyright (c) 2007 devcode * * * ^^ D E V C O D E ^^ * * Windows ANI LoadAniIcon Stack Overflow * [CVE-2007-1765] * * * Description: * A vulnerability has been identified in Microsoft Windows, * which could be exploited by remote attackers to take complete * control of an affected system This issue is due to a stack overflow * er ...

Recent Articles

Malware Evolution: January – March 2007
Securelist • Alexander Gostev • 10 May 2007

IT security professionals have predicted that 2007 will be a watershed year in the battle against computer viruses, which would have an effect on computing and computer users as a whole. In 2007 virus writers will continue to be active in creating and using Trojans which are designed to steal user data. The main targets will be users of a range of banking and e-payment systems, and online gamers. Virus writers and spammers will continue to work more and more closing together, with infected machi...