1/13: Expl_Iconex-A an Animated Cursor File |
 |
|
|
|
1/13: Expl_Iconex-A an Animated Cursor File January 13, 2005
Expl_Iconex.A is Trend Micro's detection for an animated cursor file (ANI) that exploits the Vulnerability in "Cursor and Icon Format Handling Could Allow Remote Code Execution."
Once the animated cursor is loaded, it triggers a vulnerability that allows code execution. More information on the said vulnerability can be found on the following Microsoft page:
Microsoft Security Bulletin 05-002
This exploit affects the following systems:
Microsoft Windows 2000 Service Pack 3
Microsoft Windows 2000 Service Pack 4
Microsoft Windows 98
Microsoft Windows 98 Second Edition (SE)
Microsoft Windows Millennium Edition (ME)
Microsoft Windows NT Server 4.0 Service Pack 6a
Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
Microsoft Windows Server 2003
Microsoft Windows Server 2003 64-Bit Edition
Microsoft Windows XP 64-Bit Edition Service Pack 1
Microsoft Windows XP 64-Bit Edition Version 2003
Microsoft Windows XP Service Pack 1
Technical details can be found at Trend Micro page.
|
|
|
|
ActivCard Enhances Authentication for Remote Access Over Web
Homeland Security Names First Privacy Czar
11/1: Bagle-BE Worm Opens TCP Port
Virus-Powered Phishing Unleashed
Windows Server 2003: Hardware-Based Security
How hacking has entered the age of mass production.
PGP: Extended Encryption For Compliance
A Password Policy Primer
AirDefense Describes Lack of Client Security at Show
Outtasking Solution to Company's Email Woes
Secure Your Network Against Viruses, Spam
Security Camera Industry Information
 |