Vulnerability Details : CVE-2007-1765
Public exploit exists!
Unspecified vulnerability in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a malformed ANI file, which results in memory corruption when processing cursors, animated cursors, and icons, a similar issue to CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this issue might be a duplicate of CVE-2007-0038; if so, then use CVE-2007-0038 instead of this identifier.
Vulnerability category: Memory CorruptionExecute codeDenial of service
Products affected by CVE-2007-1765
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:advanced_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:professional:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:*:*:*:advanced_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:datacenter_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:datacenter_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:advanced_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:datacenter_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:datacenter_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:professional:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:*:*:ja:server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:*:*:*:datacenter_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:advanced_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:*:*:*:professional:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:advanced_server:*:*:*
- cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:professional:*:*:*
- cpe:2.3:o:microsoft:windows_2000:-:sp2:*:*:professional:*:*:*
- cpe:2.3:a:microsoft:ie:7.0:*:vista:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:media_center:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:professional:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:home:*:*:*
- cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:tablet_pc:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:datacenter:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:enterprise:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:web_edition:*:*:*
- cpe:2.3:o:microsoft:windows_2003_server:-:*:*:*:standard:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:enterprise:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:x86:*
- cpe:2.3:o:microsoft:windows_vista:*:beta1:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:december_ctp:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:beta2:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:beta:*:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:business:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:home_basic:*:*:*
- cpe:2.3:o:microsoft:windows_vista:*:*:*:*:home_premium:*:*:*
- cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*
- cpe:2.3:a:avaya:ip600_media_servers:*:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:definity_one_media_server:*:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:s8100:*:*:*:*:*:*:*:*
- cpe:2.3:h:avaya:s3400:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-1765
7.84%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2007-1765
-
Windows ANI LoadAniIcon() Chunk Size Stack Buffer Overflow (SMTP)
Disclosure Date: 2007-03-28First seen: 2020-04-26exploit/windows/email/ms07_017_ani_loadimage_chunksizeThis module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alex
CVSS scores for CVE-2007-1765
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
References for CVE-2007-1765
-
http://www.securityfocus.com/archive/1/464287/100/0/threaded
-
http://www.microsoft.com/technet/security/advisory/935423.mspx
Vendor Advisory
-
http://www.avertlabs.com/research/blog/?p=233
Third Party Advisory
-
http://asert.arbornetworks.com/2007/03/any-ani-file-could-infect-you/
Broken Link
-
http://www.securityfocus.com/archive/1/464345/100/0/threaded
-
http://www.avertlabs.com/research/blog/?p=230
Third Party Advisory
-
http://vil.nai.com/vil/content/v_141860.htm
Broken Link
-
http://www.securitytracker.com/id?1017827
Third Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/23194
Microsoft Windows Cursor And Icon ANI Format Handling Remote Buffer Overflow VulnerabilityThird Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2007/1151
Third Party Advisory
-
http://research.eeye.com/html/alerts/zeroday/20070328.html
Third Party Advisory
Jump to