-
Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (SMTP)
Disclosure Date: 2007-03-28First seen: 2020-04-26exploit/windows/email/ms07_017_ani_loadimage_chunksizeThis module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee. Authors: - hdm <x@hdm.io> - skape <mmiller@hick.org>
1 metasploit modules found
Please note: Metasploit modules are only matched by CVE numbers.
Visit metasploit web site for more details