The Web    www.100share.com    Google
 
1/13: Expl_Iconex-A an Animated Cursor File
 

1/13: Expl_Iconex-A an Animated Cursor File
January 13, 2005

Expl_Iconex.A is Trend Micro's detection for an animated cursor file (ANI) that exploits the Vulnerability in "Cursor and Icon Format Handling Could Allow Remote Code Execution."

Once the animated cursor is loaded, it triggers a vulnerability that allows code execution. More information on the said vulnerability can be found on the following Microsoft page:

Microsoft Security Bulletin 05-002

This exploit affects the following systems:

  • Microsoft Windows 2000 Service Pack 3
  • Microsoft Windows 2000 Service Pack 4
  • Microsoft Windows 98
  • Microsoft Windows 98 Second Edition (SE)
  • Microsoft Windows Millennium Edition (ME)
  • Microsoft Windows NT Server 4.0 Service Pack 6a
  • Microsoft Windows NT Server 4.0 Terminal Server Edition Service Pack 6
  • Microsoft Windows Server 2003
  • Microsoft Windows Server 2003 64-Bit Edition
  • Microsoft Windows XP 64-Bit Edition Service Pack 1
  • Microsoft Windows XP 64-Bit Edition Version 2003
  • Microsoft Windows XP Service Pack 1

    Technical details can be found at Trend Micro page.


  •  
  • 1/26: Patco-A Worm Replaces Doc Files
  • Chinese Virus Crises Mean Trouble for U.S.
  • More Fortification For Code
  • 10/28: Agobot-NU a Worm and Backdoor
  • 2/23: Stang-A Worm Spreads Via MSN IM
  • Robbing the (Data) Bank
  • 9/23: Backdoor-CHP Lets Data Through
  • FTC Urges Industry Solutions to Spyware
  • 2/17: Poebot-A Worm Has Backdoor Functions
  • SAML Just The Start For Web Services Security
  • Palyh and Fizzer Top Troublemakers in May
  • Security Camera Articles