This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
ff5578fdfc8c36ccaad517474220f3b7300ff9d3ecf2bb352b81b0e1dffd7516
Exploit for the Microsoft Windows .ANI LoadAniIcon stack overflow vulnerability. (Hardware DEP).
712fe1c2ff48b375d86ed79e79a516acf08a26ac10ba886752f4ca552ec005a2
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
157b4e60ef0c519b39cdcd14ed1785bcf8179f18b70a23331ef92a5645137481
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Internet Explorer (6 and 7) by using the CURSOR style sheet directive to load a malicious .ANI file. Internet Explorer will catch any exceptions that occur while the invalid cursor is loaded, causing the exploit to silently fail when the wrong target has been chosen.
6b5f6b6710a71a3732c8bd3e9bdaa13eef0f941340da69f23d19c64b17e8f8bd
Microsoft Windows Animated Cursor (.ANI) local buffer overflow exploit.
c64e34f4f1bfa0a176561e8d96efc13a1f65252b8b3bec41903a133eab142fc4
Exploit for the Microsoft Windows .ANI LoadAniIcon stack overflow vulnerability.
9bbb7c1c2b71a6a3b99aa65609485e47c1dfaa3714e3947845ac1906488602f1