1/13: Expl_Iconex-A an Animated Cursor File |
 |
|
|
|
1/13: Expl_Iconex-A an Animated Cursor File January 13, 2005
Expl_Iconex.A is Trend Micro's detection for an animated cursor file (ANI) that exploits the Vulnerability in "Cursor and Icon Format Handling Could Allow Remote Code Execution."
Once the animated cursor is loaded, it triggers a vulnerability that allows code execution. More information on the said vulnerability can be found on the following Microsoft page:
Microsoft Security Bulletin 05-002
This exploit affects the following systems:
Microsoft Windows 2000 Service Pack 3
Microsoft Windows 2000 Service Pack 4
Microsoft Windows 98
Microsoft Windows 98 Second Edition (SE)
Microsoft Windows Millennium Edition (ME)
Microsoft Windows NT Server 4.0 Service Pack 6a
Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
Microsoft Windows Server 2003
Microsoft Windows Server 2003 64-Bit Edition
Microsoft Windows XP 64-Bit Edition Service Pack 1
Microsoft Windows XP 64-Bit Edition Version 2003
Microsoft Windows XP Service Pack 1
Technical details can be found at Trend Micro page.
|
|
|
|
1/26: Patco-A Worm Replaces Doc Files
Chinese Virus Crises Mean Trouble for U.S.
More Fortification For Code
10/28: Agobot-NU a Worm and Backdoor
2/23: Stang-A Worm Spreads Via MSN IM
Robbing the (Data) Bank
9/23: Backdoor-CHP Lets Data Through
FTC Urges Industry Solutions to Spyware
2/17: Poebot-A Worm Has Backdoor Functions
SAML Just The Start For Web Services Security
Palyh and Fizzer Top Troublemakers in May
Security Camera Articles
 |