/// File Name: |
ani_loadimage_chunksize-email.rb.tx..> |
Description:
|
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
| Author: | skape, H D Moore | File Size: | 9237 | Related CVE(s): | CVE-2007-1765, CVE-2007-0038 | Last Modified: | Apr 3 02:46:58 2007 |
MD5 Checksum: | 07a517f1fb87b03537a4fddfc3b6be68 |
|