The Web    www.100share.com    Google
 
1/13: Expl_Iconex-A an Animated Cursor File
 

1/13: Expl_Iconex-A an Animated Cursor File
January 13, 2005

Expl_Iconex.A is Trend Micro's detection for an animated cursor file (ANI) that exploits the Vulnerability in "Cursor and Icon Format Handling Could Allow Remote Code Execution."

Once the animated cursor is loaded, it triggers a vulnerability that allows code execution. More information on the said vulnerability can be found on the following Microsoft page:

Microsoft Security Bulletin 05-002

This exploit affects the following systems:

  • Microsoft Windows 2000 Service Pack 3
  • Microsoft Windows 2000 Service Pack 4
  • Microsoft Windows 98
  • Microsoft Windows 98 Second Edition (SE)
  • Microsoft Windows Millennium Edition (ME)
  • Microsoft Windows NT Server 4.0 Service Pack 6a
  • Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
  • Microsoft Windows Server 2003
  • Microsoft Windows Server 2003 64-Bit Edition
  • Microsoft Windows XP 64-Bit Edition Service Pack 1
  • Microsoft Windows XP 64-Bit Edition Version 2003
  • Microsoft Windows XP Service Pack 1

    Technical details can be found at Trend Micro page.


  •  
  • ActivCard Enhances Authentication for Remote Access Over Web
  • Homeland Security Names First Privacy Czar
  • 11/1: Bagle-BE Worm Opens TCP Port
  • Virus-Powered Phishing Unleashed
  • Windows Server 2003: Hardware-Based Security
  • How hacking has entered the age of mass production.
  • PGP: Extended Encryption For Compliance
  • A Password Policy Primer
  • AirDefense Describes Lack of Client Security at Show
  • Outtasking Solution to Company's Email Woes
  • Secure Your Network Against Viruses, Spam
  • Security Camera Industry Information