Proof of concept exploit for the Windows ANI File Parsing vulnerability that works against Microsoft Windows Server 2003, XP SP0/SP1, and all versions of Windows 2000.
91c664069aaf04eeb2fd8b56dc978ae1a85c97f8aebaa343b6a3a748475d770d
Microsoft Internet Explorer .ANI file handling exploit. Modified version of the houseofdabus exploit. Universal version of the exploit. Tested on: Windows Server 2003, Windows XP SP0/SP1, Windows 2000 SP2/SP3/SP4.
7d28b6b89f96a1823cf6133c4dfbbf4eeebb9afb847e5f3ffc5da17e887c96b4
Venustech AD-Lab Advisory AD_LAB-04005 - Parsing a specially crafted ANI file causes the windows kernel to crash or stop to work properly. An attacker can crash or freeze a target system if he sends a specially crafted ANI file within an HTML page or within an Email. Vulnerable: Windows NT, Windows 2000 SP0, Windows 2000 SP1, Windows 2000 SP2, Windows 2000 SP3, Windows 2000 SP4, Windows XP SP0, Windows XP SP1, Windows 2003.
a4b61c9f9acb50b67f793629552a1104d23cf0c1bf9143acaaeb455b74faf2df