| /// File Name:
This Metasploit module exploits a buffer overflow vulnerability in the LoadAniIcon() function of USER32.dll. The flaw is triggered through Outlook Express by using the CURSOR style sheet directive to load a malicious .ANI file. This vulnerability was discovered by Alexander Sotirov of Determina and was rediscovered, in the wild, by McAfee.
|Author:||skape, H D Moore|
|Related CVE(s):||CVE-2007-1765, CVE-2007-0038|
|Last Modified:||Apr 3 02:46:58 2007|